The Evolution of MAC Protocols in Wireless Sensor Networks A Survey
The Evolution of MAC Protocols in Wireless Sensor Networks A Survey
Abstract—Wireless Sensor Networks (WSNs) have become a Therefore, an efficient MAC protocol increases the lifetime
leading solution in many important applications such as intrusion of a sensor network to a great extent. In addition, the MAC
detection, target tracking, industrial automation, smart building layer controls how nodes share the wireless medium. An
and so on. Typically, a WSN consists of a large number of small,
low-cost sensor nodes that are distributed in the target area for efficient MAC protocol can reduce collisions and increase
collecting data of interest. For a WSN to provide high throughput the achievable throughput, providing flexibility for various
in an energy-efficient way, designing an efficient Medium Access applications.
Control (MAC) protocol is of paramount importance because When developing new protocols, it is necessary to inves-
the MAC layer coordinates nodes’ access to the shared wireless
medium. To show the evolution of WSN MAC protocols, this
tigate all the previous studies thoroughly. There has been
article surveys the latest progresses in WSN MAC protocol a tremendous amount of research on the design and imple-
designs over the period 2002-2011. In the early development mentation of MAC protocols in WSNs. Hence, surveys of
stages, designers were mostly concerned with energy efficiency WSN MAC protocols are conducted to summarize the varieties
because sensor nodes are usually limited in power supply. of designs and implementations. The survey in [3] reviews
Recently, new protocols are being developed to provide multi-
task support and efficient delivery of bursty traffic. Therefore,
several early designed MAC protocols based on their medium
research attention has turned back to throughput and delay. access strategies: random access or static access. Later, the
This article details the evolution of WSN MAC protocols in work in [4] analyzes advantages and disadvantages of some
four categories: asynchronous, synchronous, frame-slotted, and recently proposed WSN MAC protocols. A more comprehen-
multichannel. These designs are evaluated in terms of energy sive study in [5] classifies WSN MAC protocols into four
efficiency, data delivery performance, and overhead needed to
maintain a protocol’s mechanisms. With extensive analysis of
categories: random, slots, frames, and hybrid. These categories
the protocols many future directions are stated at the end of are generally based on the similarities and differences in
this survey. The performance of different classes of protocols the medium access methods. A recently published survey [6]
could be substantially improved in future designs by taking into classifies protocols based on various problems they intend to
consideration the recent advances in technologies and application address. In this paper, we do not just classify protocols into
demands.
different categories. We further provide a clue about why a
Index Terms—Wireless sensor networks, MAC protocols, en- protocol is proposed for a problem and what remaining issues
ergy efficiency, time-critical, TDMA, multichannel. lead to another solution, identifying the intrinsic development
flow.
I. I NTRODUCTION In the early stages, efficient data delivery was not the first
priority. Designers traded throughput and delay for energy ef-
A DVANCES in microelectronics led to the development
of low-cost tiny sensor nodes that are equipped with
sensing, processing, and communication units. A broad range
ficiency. However, to support multi-task and efficient delivery
of bursty traffic, new protocols are being developed. In this
of applications such as precision agriculture, environment survey, we provide an overview of WSN MAC protocols from
monitoring, intrusion detection, target tracking, and etc. are perspectives of both energy efficiency and data delivery perfor-
facilitated through networking these sensor nodes [1]. Many mance with more recently proposed work. We cover the most
valuable applications have been demonstrated in the SENSEI recent progression from energy efficiency towards efficient
[2] project, which is developed by the European FP7-ICT. data delivery. Based on research issues, we divide WSN MAC
Since the sensor nodes are expected to operate autonomously protocols into four branches: asynchronous, synchronous,
with small batteries for a number of months or years, energy frame-slotted, and multichannel. Compared with prior clas-
efficiency is a fundamental criterion in the design of WSN sifications, this classification makes the major problems that
protocols. A major power consuming component of a sensor each branch intends to solve clearer because each branch has
node is the radio, which is controlled by the MAC protocol. its own special obstacles to overcome. It is beneficial for re-
searchers to know the major challenges they face in the design
Manuscript received 15 July 2011; revised 26 February 2012. of MAC protocols in each branch. For instance, asynchronous
P. Huang, L. Xiao, S. Soltani, and M. W. Mutka are with the Department and synchronous are related to the mechanism of duty cycling
of Computer Science and Engineering, Michigan State University, 3115
Engineering Building, East Lansing, MI 48824 (e-mail: {huangpe3, lxiao, in WSNs. To save energy, duty cycling is widely adopted
soltani1}@cse.msu.edu). in WSNs. In this technique, each node alternates between
N. Xi is with the Department of Electrical and Computer Engineering, active and sleep states. Two nodes can communicate only
Michigan State University, 2120 Engineering Building, East Lansing, MI
48824 (e-mail: [email protected]). when they are both active. In synchronous MAC protocols,
Digital Object Identifier 10.1109/SURV.2012.040412.00105 neighboring nodes are synchronized to wake up at the same
1553-877X/13/$31.00
c 2013 IEEE
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
102 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
RICER(2004),
PTIP(2005), RC-MAC(2010)
STEM(2002), CSMA-MPS(2004), RI-MAC(2008)
no Preamble TICER(2004), X-MAC(2006),
synchronization Asynchronous Sampling(2002), DPS-MAC(2007), CMAC(2007)
B-MAC(2004)
WiseMAC(2004), AS-MAC(2008),
A-MAC(2010)
SyncWUF(2007) PW-MAC(2011)
DSMAC(2004)
local
synchronization S-MAC(2002),
RMAC(2007),
Synchronous S-MAC adaptive T-MAC(2003)
DW-MAC(2008)
listening (2004) synchronize to
receiver’s
DMAC(2004), wakeup
Q-MAC(2006)
reduce delay
TDMA- Crankshaft(2007)
ZMAC(2005) TreeMAC(2009)
ASAP(2009) PMAC(2005)
time. Therefore, the communication is facilitated and the need to maintain multiple schedules if it belongs to multiple
focus is on the delay reduction and throughput improvement. clusters. With slightly more strict global time synchronization,
Asynchronous MAC protocols, on the other hand, focus on frame-slotted schemes are able to address collision and hidden
how to efficiently establish communication between two nodes terminal problem by assigning a node an unique time slot
that have different active/sleep schedules. To provide high within its two-hop communication neighborhood to transmit.
throughput, frame-slotted mechanisms allocate time slots in Recently, the frame-slotted structure is also used for assigning
a way that no two nodes within the two-hop communication time slots to nodes for receiving instead of transmission.
neighborhood are assigned to the same slot. This addresses We discuss benefits and problems introduced by this change.
collision and hidden terminal problem, providing a collision- Finally, as current sensor platforms support multiple channels,
free data transmission environment. However, a major concern multichannel MAC protocols also become a hot topic. The
is that the channel utilization is low when few nodes have idea is to increase parallel transmissions by assigning nodes
data to send because time slots assigned to their neighbors different channels. The future trend is to combine Time
are wasted. Therefore, the focus of this branch is to im- Division Multiple Access (TDMA) with Frequency Division
prove channel utilization under low contention. In the final Multiple Access (FDMA) to address cross-channel commu-
branch, multichannel is employed to further boost network nication deficiency. Fig. 1 links MAC protocols that share
capacity. Distributed channel assignment and efficient cross- similarity in utilizing some underlying structures or exhibit
channel communication are two major challenging issues in similar behaviors.
multichannel MAC protocols. The remainder of this article is structured as follows. We
A taxonomy of WSN MAC protocols is illustrated in Fig. 1. first summarize the studies on asynchronous MAC protocols
The four horizontal branches represent our classifications. in Section II. After that, we focus on delay reduction in
We start by introducing asynchronous MAC protocols. In the synchronous MAC protocols in Section III. In Section IV
beginning, asynchronous MAC protocols use sender-initiated and Section V, we show how TDMA and FDMA can boost
low power listening (LPL) to reduce cost on the receiver side. network capacity. In Section VI, we review how standards
Later, receiver-initiated low power probing (LPP) is introduced incorporate the various techniques. Finally, we provide conclu-
to improve throughput and reduce cost on the sender side. We sions and identify potential research directions in Section VII.
analyze underlying reasons behind this transition. For syn-
chronous MAC protocols, we review the efforts that have been
II. A SYNCHRONOUS MAC PROTOCOLS
made to reduce delay. Synchronous MAC protocols group
nodes into clusters in order to set up a common active/sleep In this section we cover the trend in the design of asyn-
schedule within a cluster. An inconvenience is that a node may chronous MAC protocols, where each node chooses its active
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
HUANG et al.: THE EVOLUTION OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY 103
A
schedule autonomously. Without paying the price for synchro- C
nizing neighbors’ schedules, asynchronous MAC protocols can B
protocols, nontarget nodes can go back to sleep earlier in only be mimicked by sending a packet repeatedly. A gap exists
STEM-B. In addition, inter-beacon intervals are inserted to let between two transmissions and the outlier detection based
the target receiver be able to reply with an acknowledgment CCA searches for outliers to determine channel state. The gap
(ACK). In this way, the sender can start data transmission between two transmissions may introduce false negatives (i.e.,
earlier, resulting in a reduction in setup latency. It is possible channel is not active) that increase setup latency. Therefore,
that collisions between beacons occur. A node then cannot a node must sample the channel long enough to accurately
determine whether it is the target receiver or not. It turns determine the channel state.
its data radio on without sending an acknowledgment back. To be compatible with packetizing radios, it is justified to
Since the sender cannot get any acknowledgment, it has to uses a series of short packets containing useful information
transmit the beacon stream for a sufficient amount of time as the wake-up preamble and utilize the gap to accommodate
(approximately equal to the channel sampling interval) before an early ACK as shown in Fig. 3. When there is no collision,
it sends the data frame on the data channel. If a node wakes up the design addresses the overhearing problem and cuts back
due to beacon collisions and it does not receive any data after the preamble length. Protocols that share the similar design
some time, it times out and goes back to sleep. Obviously, include CSMA-MPS [18], TICER [19], X-MAC [20], MH-
when there is no beacon collision, STEM-B exhibits its merit MAC [21], DPS-MAC (Dual Preamble Sampling MAC)
of shortening preamble length, leading to lower setup latency [22], and CMAC [23]. DPS-MAC [22] and MH-MAC [21]
and better energy efficiency. However, if data transmission is also include timing information for broadcast messages, allow-
rare, STEM-B is less energy efficient than STEM-T because ing receivers to go back to sleep and wake up at the beginning
the channel sampling period must be longer than the inter- of the data transmission. Strobed preamble sampling, however,
beacon interval in STEM-B while detecting a wake-up tone incurs more energy waste in channel sampling because the
in STEM-T takes much less time. channel sampling duration must be larger than the gap between
two short packets. Some protocols such as SpeckMAC-D
[15] and MX-MAC [24] repeat an actual data packet as the
D. Reduce Preamble Length by Packetization preamble. The channel sampling duration is even longer. As
Apparently, it is beneficial to divide a long preamble into shown in Fig. 3, if a node detects channel activity when it
a series of short packets that take some useful information. wakes up, it must stay awake until it decodes the destination
If the destination address is included, nontarget nodes can address information from the next short preamble packet.
immediately go back to sleep when they receive a short Using data packet as the short preamble packet increases the
preamble packet. This improves energy efficiency. ENBMAC idle listening period.
[12] uses the method to address the aforementioned overhear- In continuous preamble sampling, the channel sampling
ing problem. If the timing information about when the data duration is short and thus the channel sampling can be made
transmission will begin is also included, the target receiver frequent. This reduces per-hop latency while keeping a low
can return to sleep once it decodes the timing information duty cycle. Strobed preamble sampling has the merit of cutting
and wake up later to receive the data as shown in Fig. 3. back preamble length. To combine the two features together,
Neighboring senders that fail on channel contention can go DPS-MAC (Dual Preamble Sampling MAC) [22] and CMAC
back to sleep as they know when the current transmission [23] introduce a dual preamble sampling approach. Nodes
will end. Many protocols such as MFP [13], B-MAC+ [14], periodically check the channel state by polling the channel
SpeckMAC [15], DPS-MAC (Divided Preamble Sampling- with the basic LPL method. Because the polling may fall
MAC) [16], and SyncWUF [17] share the similarity although into the gap between two short packets, a second channel
they utilize different information for different problems. Note polling is initiated if the channel is found free in the first
that although they divide a long preamble into chunks, there polling. To ensure that channel activity can be detected, two
is no gap between chunks. We classify them as Continuous conditions must be met: (1) the interval between two instants
Preamble Sampling protocols. of polling is larger than the gap between two short preamble
For unicast transmissions, it is desirable to terminate the packets; (2) the time duration of a short preamble packet
preamble transmission once the target receiver is awakened. transmission is larger than the interval between two instants
The similar idea of STEM-B has been adopted in single chan- of polling. Although this method reduces idle listening of
nel designs: a gap between two short packets is deliberately strobed preamble sampling, it is sensitive to the switching
inserted to allow the target receiver to reply with an early time of radio. Since the time duration of a short preamble
ACK. We call it Strobed Preamble Sampling. This design packet transmission must be larger than the interval between
is partially pushed by hardware advance toward packetizing two instants of polling, switching time affects the size of a
radios. Instead of transmitting a raw bit stream, a packetizing short preamble packet.
radio takes the input as the payload of a packet and inserts its In addition to dual channel sampling, CMAC [23] also
own preamble, header information, and CRC. When a packet introduces anycast to reduce per-hop latency. Instead of let-
is received, the radio passes the payload of the packet to the ting nontarget nodes go back to sleep to reduce overhead
microprocessor if the packet passes the CRC check. While this of overhearing, CMAC allows them to reply if they can
radio technology reduces the burden on the microprocessor, it make progress (defined by geographical distance) towards the
introduces a challenge to LPL protocols that assume a wake- destination. To alleviate collisions among multiple candidates,
up preamble of a continuous bit stream. The reason is that the a contention-based mechanism is adopted to let the best one
TX FIFO is limited in low cost radios and a long preamble can reply first. This results in a slightly larger gap between two
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
HUANG et al.: THE EVOLUTION OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY 105
t
Continuous Preamble Data
Rx
Preamble
Sampling t
Packetization Tx P P P P P P P P P P Data
t
P Data
Rx
t
Tp Tgap A
Packetization C
Tx P P P K Data
Early ACK
t
Strobed A
Preamble C
Rx P K Data
Sampling
Ts Tgap A t
Packetization
Early ACK C
Rx P K Data
Dual preamble sampling
t
Tp + Tgap
short packets. As shown in Fig. 3, if the channel is detected as The shortened preamble alleviates the overhearing problem
busy in the second polling, a node can nap for at most Tgap and increases the channel capacity. Some protocols utilize
if it does not want to miss the next short preamble packet a similar idea with some improvements. For example, in
for address decoding. The maximum idle listening period is SyncWUF [17], if the receiver’s schedule is known and the
(Tgap + Tp ) − (Ts + Tgap ) = Tp − Ts where Tgap is the time computed preamble length is short enough, a simple wake-up
period of the gap, Tp is the time period of a short preamble tone is used same as in WiseMAC. However, if the receiver’s
packet, and Ts is the channel sampling period. Since Tp must schedule is unknown or out-of-state or it is a broadcast
be greater than Tgap , the larger gap used in CMAC introduces message, a long preamble is divided into chunks that contain
slightly higher idle listening overhead. In addition, the anycast timing information to reduce unnecessary waiting time. In
incurs higher overhead compared with unicast due to collisions CSMA-MPS [18], strobed preamble sampling is combined
among multiple candidates. Therefore, CMAC switches a node with schedule learning. Because CSMA-MPS allows for early
to unicast if the best next hop is found or no better next hop ACK, a node may not need to finish a preamble of the
can be found after a duty cycle length. worst case length. Although schedule learning squeezes more
room for data transmission, the cost of maintaining up-to-
date schedules of neighbors pushes some studies to shift the
E. Reduce Preamble Length by Schedule Learning responsibility of establishing communication from the sender
Although strobed preamble sampling reduces the preamble side to the receiver side.
length on average, the preamble transmission still occupies
the channel until the target receiver wakes up. The preamble
transmission prevents neighboring nodes from transmission, F. Improve Throughput with Receiver Initiated Transmission
leading to low channel capacity. In addition, transmitters waste Fig. 4 illustrates the disadvantage of preamble transmission.
energy in preamble transmission and nontarget nodes are When there are contending flows (e.g., A sends to B and C
awakened unnecessarily, causing energy deficiency at both the sends to D), the preamble transmission prevents neighboring
sender and the receiver. nodes from delivering their packets. When nodes C and D
For an infrastructure network, WiseMAC [25] lets access wake up, they go back to sleep immediately after they find out
points stay awake to learn sensor nodes’ wake-up schedules. that they are not the target receiver of current transmission.
Access points are not power constrained and each access point This leads to low channel capacity and high delay when there
serves a number of sensor nodes. If the access point does are contending flows.
not know the channel sampling schedule of a sensor node, To avoid occupying the channel before a pair of nodes
it sends a long preamble. When a node receives a packet, are ready to exchange data, a number of protocols muffle
it include its channel sampling schedule in the ACK. With the sender and rely on the target receiver’s beacon message
the up-to-date channel sampling schedules of sensor nodes, to initiate data transmission. As shown in Fig. 5, a node
the access point only needs to start preamble transmission broadcasts a beacon to announce that it is ready for receiving
slightly before the target receiver wakes up. The duration of when it wakes up. Because a node stays awake if it has
the preamble is computed to guarantee that the senor node data to send, it can hear the target receiver’s beacon. Upon
will not miss the preamble at a worst case clock drift offset. receiving the beacon from the target receiver, the sender starts
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
106 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
A B B DATA B
C A t
P P P P P P K DATA
A t
A B DATA B
C B t
P K DATA
B t B: beacon Active
P Transmit Receive
C t
Fig. 5. In low power probing, a sender does not occupy the wireless medium
P
D t until the receiver is ready to receive.
PW-MAC utilizes the beacon message used in RI-MAC to A CW RTS CTS DATA ACK
contend
nization. Each cluster has an independent schedule composed RTS CTS DS DATA ACK
A
of three periods: SYNC, DATA, and SLEEP. All nodes of
the same cluster wake up at the beginning of the SYNC B RTS CTS DATA ACK RTS
period to synchronize clocks with each other. Then, nodes
with packets to send contend for exchange of Request-to- C contend CTS FRTS contend RTS CTS
Send (RTS) and Clear-to-Send (CTS) frames in the DATA
period. Nodes that are not involved in communication, return D active FRTS active RTS CTS
to sleep at the start of the SLEEP period; other nodes return TA
to sleep after they finish transmission of data packets and Collision FRTS: Future-Request-to-Send DS: Data-Send
acknowledgement (ACK) frames. It is noticeable that in each TA: the minimal amount of idle listening before going back to sleep
cycle a packet can only be forwarded by one hop. Although
adaptive listening [34] is later introduced into S-MAC to Fig. 7. The FRTS mechanism in T-MAC.
overcome this deficiency, the improvement is limited. A packet
can only be forwarded by at most 2 hops per cycle.
S-MAC with adaptive listening [34] is illustrated in Fig. 6. C. Shifting Data Transmission to the Sleep Period
Nodes can only hear their immediate neighbors (e.g., node Inspired by the FRTS mechanism, RMAC [36] presents a
B can only hear node A and node C). Because node C can novel approach to reduce latency in multi-hop forwarding.
overhear the CTS sent by node B, it goes back to sleep at the Same as S-MAC, time is divided into repeated cycles and
beginning of the SLEEP period but wakes up at the end of each is further divided into three periods: SYNC, DATA, and
the current transmission. Node B can therefore immediately SLEEP. Instead of exchanging data during the DATA period,
forward the data packet to node C instead of waiting for the a control frame called Pioneer Frame (PION) is forwarded by
next cycle. The cost is that not only the target receiver but multiple hops. The control frame informs nodes on a routing
all nodes that overhear the RTS and the CTS will wake up. path of when to wake up in the SLEEP period. A PION not
The benefit is that S-MAC with adaptive listening can relay only serves as a RTS frame to request communication, but also
a packet by 2 hops per cycle. However, the delivery cannot confirms a request like a CTS frame. RMAC and DW-MAC
go beyond this because the next hop (i.e., node D) will not [37] are similar as shown in Fig. 8. The differences are that
wake up since it cannot overhear the CTS from its two-hop the Scheduling Frame (SCH) in DW-MAC is called PION in
neighbor (i.e., node B) and does not know when the current RMAC, and the time T1s is 0 in RMAC, which implies that
transmission will end. The long end-to-end delay makes S- the first hop starts data transmission when the SLEEP period
MAC inappropriate for applications that require strict timing starts. The drawback of RMAC is that two hidden terminals
constraints. may always cause collisions of data transmission although they
succeed in scheduling through PIONs. For example, node C in
B. Future Request-to-Send
Fig. 8 may initiate a PION later than node A. Although they
Instead of fixing the length of the active period, T-MAC can succeed in PION transmission, they start data transmission
[35] makes a node stay awake until no activation event has at the same time when the SLEEP period starts as they are both
occurred for a certain amount of time. This design aims to the first hop. They will collide with each other and downstream
achieve optimal active periods under various traffic loads. nodes will wake up unnecessarily if the expected data packets
However, overhearing is introduced because a node has to stay cannot arrive due to collisions at previous hops.
awake while it is not involved in data transmission. T-MAC DW-MAC [37] thus introduces a one-to-one mapping func-
justifies overhearing with improvement on the throughput. tion to this design to ensure collision-free data transmission in
Another contribution of T-MAC is the idea of Future the SLEEP period. In the example illustrated in Fig. 8, node
Request-to-Send (FRTS) packet, which allows a node to notify B calculates its wake up time T1S as
its target receiver that it cannot access the medium at the
current time. The mechanism has the potential to extend the T1D T1S
=
data delivery to up to 3 hops per cycle. As shown in Fig. 7, TDAT A TSLEEP
when node C loses contention and overhears a CTS packet, TSLEEP
⇒ T1S = T1D ·
it sends a FRTS packet to its target receiver D. The FRTS TDAT A
packet contains the length of the current data transmission
In addition,
from node A to B, hence the target receiver D can learn its
T3D T3S
wake-up time. However, nodes that are further downstream = (1)
cannot overhear the FRTS and thus will not wake up. The TDAT A TSLEEP
mechanism thus cannot be performed iteratively and a packet Equation 1 implies that if node A can receive a confirmation
can only be forwarded by at most 3 hops per cycle. During SCH from node B, the time length of T3S is assured to be
the time it postpones its data transmission for the FRTS, node collision-free because node B can receive a SCH correctly
A must transmit a Data-Send (DS) packet of the same size during T3D . They are one-to-one scaled based on the ratio be-
of FRTS to prevent any neighboring node from taking the tween TSLEEP and TDAT A . Therefore, successfully reserved
channel. The collision of FRTS and DS at node B is not a data transmission will never collide at a target receiver in
problem because they are useless for node B. The potential the SLEEP period. If the SCH sent to node B is collided,
collision of multiple FRTS packets, however, is not discussed. node B will not respond a confirmation SCH and thus node
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
HUANG et al.: THE EVOLUTION OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY 109
T2D T2S
wake up
T1D T3D T1S T3S
A and B will not reserve a time for data transmission during another RECV slot 3μ later than the current RECV slot to
T3S . However, if the confirmation SCH is collided at node A, check whether node A has data to send to it. The length of 3μ
node A will not wake up to send during T3S but node B will is selected to ensure that the previous packet has be forwarded
wake up to receive. The difficulty is that the sender cannot 3 hops away. In addition, node D also needs to send a MTS
distinguish the collision of a request SCH and the collision of packet to node E to make node E wake up periodically. This
a confirmation SCH. It can only conservatively regard that the ensures that when node D wins channel access, node E is
reservation failed. Consequently, all downstream nodes will ready to receive. The overhead is increased along with the
wake up unnecessarily to receive the expected data packet traffic load because nodes on routing paths have to wake up
that will not arrive due to the false alarm. repeatedly for contention of sending or receiving.
The cost of waking up unnecessarily may be tolerable, but Similarly, Q-MAC [39] also defines staggered schedule but
any failure of a sequential SCH reservation is a waste of time the active periods are shifted in a way that facilitates downlink
and it significantly limits the number of packets that can be traffic, carrying queries from the sink to sources. The MAC
delivered in a cycle. A sequence of time slots are reserved is designed for query based sensor networks where the sink
for a data packet but no data will be transmitted, whereas initiates data gathering by sending a query to the source. For
many other data packets have no time to reserve time slots for uplink traffic, Q-MAC has two options. The simplest way is to
transmission because the DATA period is limited. In a complex let each node remain active from the instant of query reception
multiple flow scenario, the performance of throughput, delay, to the time the queried data are forwarded. If the sink knows
and power consumption is significantly compromised due to the route length in advance, an uplink staggered schedule can
the incorrect channel reservation. be constructed. Although Q-MAC reduces latency, it incurs
long idle listening if the route length is unknown. Low-power
wireless communication is vulnerable to interference and thus
D. Staggered Schedule
routes in WSNs are usually not fixed. Therefore, the energy
For specific applications, some underlying structures can efficiency of Q-MAC is questionable when the route length is
be utilized. DMAC [38] targets at data gathering applications hard to determine.
where data are delivered from multiple sources to a sink.
Based on the naturally formed data gathering tree, the ac-
tive/sleep schedules of nodes are staggered so that packets E. Adaptive Duty Cycle
can flow continuously toward the sink. The basic preamble sampling method requires a long pream-
As shown in Fig. 9, each node skews its wake-up time dμ ble before data, following the design of synchronous MAC
ahead of the sink’s schedule in accordance with its depth d on protocols, SCP-MAC [40] synchronizes neighbors’ channel
the data gathering tree. The variable μ represents the length polling so that only a short preamble is required to wake
of the time that is needed for one packet transmission and the receiver up. Because a cluster of nodes share the same
reception. The ordered offsets of schedules ensure sequential schedule, contention is more severe compared with schedule
transmission and lead to low delay. However, because nodes learning in asynchronous MAC protocols. However, SCP-
of the same depth have the same offset, they contend for MAC incurs less schedule maintenance overhead as nodes do
sending to their receivers. When one node wins channel not need to maintain multiple schedules.
access, its neighboring nodes of the same level lose their To reduce multi-hop latency, SCP-MAC develops an adap-
chance of transmission. In order to increase the number of tive channel polling mechanism to add additional polling slots
active slots, a data prediction mechanism and a More-to-Send along the path. As shown in Fig. 10, when node B receives a
(MTS) notification are introduced. In Fig. 9, if node B wins packet at the first regular polling slot, it adds n high frequency
channel access opportunity to send to C, node C needs to add polling slots to receive additional data packets from node A. If
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
110 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
any of the additional polling slots was successfully used, node in each cluster. However, if the active periods of two clusters
B extends the adaptive polling with another n slots; otherwise, overlap, the collision-free data transmission is no longer
it returns to the regular polling frequency. In order to quickly guaranteed. Therefore, although local time synchronization is
shift nodes on a routing path to adaptive polling, node A more scalable, TDMA is usually defined with slightly more
intentionally pauses its transmission at the second regular strict global time synchronization. Although TDMA requires
polling slot, allowing node B to send to C, but nodes A and global time synchronization, the adoption of frame-slotted
B have to contend for sending in the following adaptive slots. schemes will not introduce additional overhead in applications
The procedure repeats so that a new node can enter the high that require time synchronization to provide spatial-temporal
frequency polling at each regular polling slot. For adaptive correlation between reports generated by multiple sensors. For
polling slots, n is set to 3 considering that each node contends example, in the SENSEI project [2] developed by European
with its previous and next hop. However, it is possible that FP7-ICT, heterogeneous wireless sensor and actuator networks
a node loses contention for all of the 3 slots and returns have to be integrated into a common framework. In order to
to the regular low frequency polling, which will interrupt obtain information from various sensors located in the physical
the continuous forwarding. In addition, inter-flow contentions world, the spatial and temporal results from the sensors should
may also degrade the adaptive polling performance. DSMAC be synchronized. Frame-slotted MAC protocols would be a
[41] is another WSN MAC protocol that changes duty cycle promising candidate for these kinds of applications.
dynamically. A node doubles its duty cycle when it detects Frame-slotted MAC protocols are also popular in small
the increase of its neighbors’ bandwidth demands and the new scale networks. A special case of WSN is the wireless body
duty cycle is broadcasted along with the SYNC packet. These area network (WBAN). A WBAN consists of a number of sen-
methods reduce delay when the traffic load increases. sors that are either connected with a person’s body or are small
enough to be implanted. Sensors transmit data at a relatively
F. Summary wide range of data rates from 1 Kbps to 1Mbps for body tem-
perature, electrocardiography (ECG, heart), electromyography
In this section, we reviewed the efforts that have been
(EMG, muscular contractions), electroencephalography (EEG,
made to reduce multi-hop forwarding delay in synchronous
brain), movement, and etc. The WBANs have relatively con-
MAC protocols. With the help of data gathering tree structure,
stant network structures and fixed sensor functions. Therefore,
schedules can be staggered to create a continuous flow to
many recently proposed MAC protocols are TDMA-based
the sink. However, nodes wake up unnecessarily if their
[42] [43] [44] [45]. In these networks the synchronization
upstream nodes lose contention in channel access. Note that
procedure can be simplified due to the hierarchical structure.
multiple flows converge at the sink and thus the contention
Master nodes that have more power act as coordinators and
becomes more and more severe near the sink. Without the
this removes the need of idle listening for other nodes [46].
traffic pattern constraint, most protocols try to notify as many
nodes as possible on active routes of incoming data as soon
as possible. One trend is to shift data transmission from the A. Increase Channel Utilization by Slot Stealing
DATA period to the SLEEP period and use the DATA period A major drawback of TDMA is its low channel utilization
for notification and scheduling. While this paradigm mini- when only few nodes have data to send because a node can
mizes delivery latency for individual packets, some packets transmit only in its assigned time slots. A sensor network,
may experience long delay as they cannot be scheduled for however, generates no or few data packets most of the time. To
transmission within limited DATA period. Therefore, more improve channel utilization of TDMA under low contention,
efficient scheduling methods are needed. Without a subtle Z-MAC [47] incorporates Carrier Sense Multiple Access
scheduling design, the delay can be reduced by dynamically (CSMA) into TDMA.
increasing the duty cycles of nodes on the active routing paths. When a WSN is deployed, Z-MAC applies DRAND [48] to
The performance improvement, however, comes with the cost do time slot assignment. DRAND ensures that no two nodes
of increased energy consumption. within the two-hop communication neighborhood are assigned
to the same slot. To further increase the channel utilization,
IV. F RAME - SLOTTED MAC PROTOCOLS a time frame rule is designed to adapt the local frame size
Frame-slotted schemes derive from Time Division Multiple to a node’s local neighborhood size. To combine CSMA with
Access (TDMA). The advantage of TDMA is that the through- TDMA, a node is allowed to contend for sending if a slot is not
put is high with maximized channel utilization under high con- used by the owner. Consequently, Z-MAC performs as CSMA
tention. TDMA can be used in synchronous MAC protocols under low contention and possesses high channel utilization
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
HUANG et al.: THE EVOLUTION OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY 111
A B C D
n adaptive dynamic extension
1st regular 2nd regular
channel
polling
In multichannel MAC protocol designs, two questions need can be modeled as finding a minimum K-way cut that
to be answered: how to allocate channels and how to achieve minimizes inter-channel communication in the graph given by
cross-channel communication. The solution must also consider the network topology. To reduce the complexity of solving the
energy efficiency and cost. problem, a heuristic method is introduced in [60]. The idea
is to move some nodes to another channel when a channel
A. Address Cross-channel Communication becomes overloaded.
The first step is to define a metric that measures the effect of
MMSN [56] points out that multichannel MAC protocols
a crowded channel. All channels are organized as a ladder and
designed for general wireless networks are not suitable for
all nodes start at the lowest channel. Each node periodically
WSNs because of two reasons. First, they use some more
broadcasts the total number of times it successfully and
powerful radios such as radios that have multichannel sensing
unsuccessfully acquires the channel, s and f respectively.
ability. Second, the control overhead of channel negotiation
Node i estimates the probability that anyof its neighbors
can
is acceptable considering that the data packet size is much
successfully access the channel as αi = ( j sj )/ j (sj +fj ).
larger. As an example, MMAC [57] assumes that time is
If the value is less than a threshold, node i considers a switch
synchronized and divided into fixed-length beacon intervals.
from its current channel to the next higher channel with a
Each beacon interval is further divided into an ATIM (Ad Hoc
probability that depends on the channel quality difference and
Traffic Indication Messages) window and a communication
how closely a node resembles a sink. A node that acts like
window. Nodes negotiate which channel to use for data
a sink has a low-cost outgoing link because it sends less
transmission on the same default channel in the ATIM window,
traffic and this makes it more appropriate to cut. The method
and then switch to the reserved channels for communication in
assumes that some intermediate nodes can do aggregation so
the communication window. Later, TMMAC [58] introduces
that they send less than they receive; otherwise the probability
dynamic ATIM window adjustment rules to increase the
of initiating channel switch will be zero for all intermediate
flexibility of the design. Because data packet size is usually
nodes. When a node switches, nodes that communicate heavily
small in WSNs, at most 128 bytes for CC2420 radio [59],
with it also switch. If a transmitter wants to send data to a
pairwise channel negotiation for each packet introduces high
receiver on a different channel, the transmitter simply switches
control overhead. Authors of MMSN thus proposed to assign
to the receiver’s channel. As a result, the transmitter may miss
channels to nodes in a static way. The idea is to let a node
some packets destined for it.
learn its neighbors’ channel choices and then select a channel
Similarly, TMCP [61] partitions a sensor network to K
that is not chosen by any of its neighbors within the two-hop
vertex-disjoint trees, each of which is assigned a channel.
communication neighborhood. The idea is similar to the time
Different from K-way cut problem that aims at minimizing
slot assignment for receivers, thereby the channel assignment
inter-channel communication, TMCP tries to minimize the
cannot guarantee collision-free data transmission.
maximum intra-tree interference value among all trees. TMCP
To allow two nodes of different channel choices to commu-
defines the interference value of a tree as the maximum inter-
nicate, MMSN introduces toggle snooping and toggle trans-
ference value among all non-leaf nodes and the interference
mission. If a node has data to send, it must listen on its own
value of a node is defined as the number of nodes within the
channel (fself ) for potential data reception and listen on its
node’s interference range. The definition is not very accurate
target receiver’s channel (fdest ) for clear channel assessment.
since a node’s neighboring nodes are potential but not actual
MMSN thus lets the node snoop on the two channels alter-
interferers. Two nodes with the same number of neighboring
nately. If the node does not sense any signal on both channels,
nodes can experience different levels of interference depending
the node transmits a preamble alternately on the two channels.
on their neighbors’ activities. Therefore, the metric does not
The toggle transmission not only prevents other nodes from
reflect the actual interference intensity.
sending data to the transmitter but also informs any node that
Comparing with node-based multichannel protocols such
intends to transmit on fdest to back off. The toggle snooping
as MMSN [56], link-based multichannel assignments require
period (TT S ) is twice as long as the toggle transmission period
fewer number of orthogonal channels and incur fewer channel
(TT T ). The setting ensures that when a node sends out a
switches. Currently, they only divide nodes into K groups
preamble using toggle transmission, any other node that is
given K available channels. To further increase parallel trans-
toggle snooping can detect the transmission within a maximum
missions, spatial reuse of channels can be considered.
delay of TT S if they have a shared channel. Considering that
GBCA [62] proves that finding a channel assignment that
the cost of channel switching is nontrivial [60], nodes that use
minimizes the total interference in a network is NP-hard.
the toggle snooping/transmission frequently may exhaust their
Therefore, it models a channel assignment game to solve the
energy earlier than other nodes.
problem with a suboptimal result. Since routing in WSNs
is generally static and of tree/forest structure, it models the
B. Channel Assignment based on Metric Optimization parent of each Parent-Children Set (PCS) as a player. These
Le et al. [60] claim that frequency synthesizer needs time to players negotiate channel usage base on the Best Response
stabilize and thus communication in the same channel incurs (BR) dynamic, trying to maximize their payoff in each itera-
less overhead compared with inter-channel communication. tion. It proves that there exists a Nash Equilibrium (NE) in the
Therefore, they propose to group nodes that communicate game and the solution converges to the NE in polynomial time.
frequently into the same channel and separate nodes that However, same as TMCP [61], the interference is measured
do not communicate much into different channels. The idea based on network topology without considering current traffic
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
114 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
CF slots contention
window
channel
F1 F2 F3 CM DATA F1 time slot
control CM DATA F2 f1
channel node 1 node 2 node 3
CM DATA F3
f2
node 1 node 2
Fig. 13. Time slot structure in MC-LMAC. f3
node 1
f4
pattern. As a result, it may not reach the best solution for time
current interference condition. To adapt to dynamic traffic, the
game theoretic approach may incur excessive overhead. channel data ACK Notify that a
polling reception (optional) node will wait
for messages
PAN ID 1 PAN ID 2
PAN Coordinator
Full Function Device
Coordinator
Reduced Function Device
Communication Flow
Beacon Interval
Contention-Free
Contention Access Period (CAP)
Period (CFP)
every u unicast slots. The channel numbers of these broadcast VI. S TANDARDS
slots also follow a pseudo-random hopping sequence and the
Along with academic researches, standards are developed
sequence is identical for all nodes.
to speed up utilization of WSNs. We briefly discuss some
Because nodes choose channels randomly for each slot, two
industrial progresses in this section.
nodes may choose the same channel for a particular slot.
If they are within the interference range of each other, the
amount of parallel traffic is reduced. To address the problem, A. IEEE 802.15.4 and ZigBee
MuChMAC divides a time slot into several subslots. A node The IEEE 802.15.4 standard [66] is proposed for Low-
will choose one of the subslots to wake up. Obviously, the Rate Wireless Personal Area Networks (LR-WPANs). The key
chance that two nodes choose the same channel/subslot pair features of low cost, low power consumption, and low data
is low, but many subslots are wasted. Therefore, how to assign rate typically fit the requirements of WSNs. Two different
channel/slot to nodes efficiently remains an open issue. device types are defined in IEEE 802.15.4: a full-function
device (FFD) and a reduced-function device (RFD). A FFD is
E. Summary a device that can serve as a PAN coordinator or a coordinator
Static channel assignments may be optimized for a certain while a RFD is intended for extremely simple applications and
topology, but considering that interference condition changes implemented with minimal resources and memory capacity.
in accordance with traffic, it is better to flexibly allocate The standard supports two topologies: the star topology
channels among nodes. Dynamic channel allocation, however, and the peer-to-peer topology as shown in Fig. 15. In the
is a tough task same as the adaptive time slot assignment. In star topology, all communications must go through the PAN
addition to channel assignment, cross-channel communication coordinator which is the central controller of the WPAN. In
is another challenge in multichannel MAC protocols. Cur- the peer-to-peer topology, any device can communicate with
rently, toggle snooping/transmission may draw energy quickly. any other devices if they are in the communication range of
An alternative way is to combine TDMA with FDMA. A one another, but still the PAN coordinator must be present to
good example of scheduling senders is introduced in MC- choose PAN identifier and manage the network. More complex
LMAC [63], but overhead is slightly high and channel/slot network structures can be constructed out of the peer-to-peer
utilization is low under low contention. If slots and channels topology. An example is the multicluster tree where the PAN
are assigned for receiving as in Y-MAC [64] and MuChMAC coordinator can instruct a device to become the coordinator of
[65], contentions among senders need to be addressed if two a new cluster adjacent to the first one. Other devices gradually
receivers happen to hop to the same channel. connect to the network and extend the coverage area.
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
116 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
Two modes of operation exist in IEEE 802.15.4, namely B. WirelessHART and ISA-100.11a
the beacon-enabled mode and the nonbeacon-enabled mode.
WirelessHART [75], released by the HART Communica-
In the nonbeacon-enabled star topology, the PAN coordinator
tion Foundation in September 2007, is the first open wireless
stays awake. Associated devices send to the PAN coordinator
communication standard for process control and related ap-
or request data from the PAN coordinator in a contention-
plications. Soon ISA-100.11a [76] was approved by the ISA
based way, applying the Carrier Sense Multiple Access with
Standards and Practices Board as an official ISA standard in
Collision Avoidance (CSMA/CA). In the nonbeacon-enabled
September 2009. In general, ISA-100.11a is more flexible by
peer-to-peer topology, the devices wishing to communicate
providing more configurable parameters than WirelessHART.
have to keep their radio on constantly or some synchronization
For example, the time slot size is fixed at 10 ms in Wire-
mechanisms have to be employed. How to achieve synchro-
lessHART while in ISA100.11a it is configurable on a per-
nization in the peer-to-peer topology, however, is beyond the
superframe base. Both standards use Time Division Multiple
scope of the standard. To facilitate low-power operation, a
Access (TDMA) with frequency hopping for channel access
superframe structure is defined in beacon-enabled mode. The
in the 2.4 GHz band. The combination of direct sequence
coordinator broadcasts beacons periodically and all associated
spread spectrum (DSSS) and frequency-hopping spread spec-
devices are synchronized by the beacons. As shown in Fig. 16,
trum (FHSS) makes WirelessHART and ISA-100.11a more
the superframe has an active and an inactive portion. The
robust to interference in harsh industrial environments. IEEE
active portion is divided into the contention access period
802.15.4 defines 16 channels (i.e., channels 11-26) in the
(CAP) and the contention-free period (CFP). All contention-
2.4 GHz band. WirelessHART uses channels 11-25 because
based transactions must be completed before the CFP begins,
channel 26 is not legal to use in some countries. In ISA-
which is reserved for low-latency applications or applications
100.11a, channel 26 is optional.
requiring specific data bandwidth. A device can request a
WirelessHART adopts a slotted hopping scheme as shown
guaranteed time slot (GTS) in the CAP. A coordinator can
in Fig. 18(a) where the channel is changed in each slot while
allocate up to seven GTSs, and a GTS is allowed to occupy
ISA100.11a defines three channel hopping schemes including
more than one slot period. The optional superframe structure
slotted hopping, slow hopping, and hybrid hopping. As shown
allows the coordinator to switch to the low-power sleep mode
in Fig. 18(b), a device stays on a channel for a collection of
periodically and provide the data with quality of service (QoS).
contiguous time slots in slow hopping. This supports devices
In multihop networks, the beacon-enabled mode is not
with imprecise timing settings or devices that want to join
that straightforward. Beacons of one coordinator may col-
the network. A node can mainly scan these channels for the
lide with beacons from other coordinators or data frames
advertisement of a target network. The slow hopping also
from nodes that are associated with other coordinators. The
serves as a way to improve support for event-based traffic.
beacon collisions are intolerable because beacons provide
Usually a group of devices share a slow hopping period in a
synchronization and define the superframe structure (i.e., CAP,
contention-based way, that is, transmissions in a slow hopping
CFP, and inactive period). In addition, if two coordinators’
period is CSMA/CA based. When an event triggers the need
superframes overlap with each other, the CFP is no longer
for a device to immediately transmit a data packet or an
collision-free. These problems motivate researchers to work
alarm, the device does not need to wait for the next time slot
on beacon scheduling [67] [68] [69] [70] [71]. Generally,
that is assigned to it, thereby reducing the latency. However,
there are two methods. The first approach is superframe
slow hopping increasing devices’ energy consumption as they
duration scheduling (SDS) where each coordinator transmits
have to listen to the channel for possible incoming packets.
its superframe during the inactive period of its neighbors in
Therefore, hybrid hopping combines slotted hopping and slow
the two-hop communication neighborhood as illustrated in
hopping (Fig. 18(c)), in which slotted hopping accommodates
Fig. 17(a). A long inactive period used in this approach may
periodical messages and slow hopping improves support for
introduce significant delay in data transmission. The second
less predictable messages. In WirelessHART, the channel hop
approach is to create a beacon-only-period (BOP) at the start
patterns is controlled by the network manager. In ISA100.11a,
of the superframe where each coordinator selects a free time-
five preprogrammed hopping patterns are defined as below.
slot to transmit its own beacon and thus avoid collisions
(Fig. 17(b)). Because the active periods overlap with each • Pattern 1: 19, 12, 20, 24, 16, 23, 18, 25, 14, 21, 11, 15,
other, how to allocate GTSs efficiently is still under research 22, 17, 13 (, 26)
[72]. • Pattern 2: pattern 1 in reverse
The IEEE 802.15.4 standard defines the physical layer • Pattern 3: 15, 20, 25 (intended for slow-hopping chan-
(PHY) and the medium access control (MAC) sublayer spec- nels)
ifications. ZigBee [73] builds up the network layer and the • Pattern 4: pattern 3 in reverse
application layer on top of the IEEE 802.15.4 physical and • Pattern 5: 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22,
data link layers, thus defining a full protocol stack for LR- 23, 24, 25 (, 26).
WPANs. In industrial applications, comparison [74] shows that Pattern 1 ensures that any retransmission will not be per-
Zigbee is not suitable because it cannot meet the stringent formed on the same IEEE 802.11 channel so as to avoid
industrial requirements, especially the deterministic delay and constant interference from IEEE 802.11 devices. In addition,
high reliability. Some industrial wireless standards thus high- both WirelessHART and ISA-100.11a support blacklisting that
light their features of strict latency and high reliability for eliminates channels of significant interference. The frequency
factory automation. diversity together with the time diversity make WirelessHART
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
HUANG et al.: THE EVOLUTION OF MAC PROTOCOLS IN WIRELESS SENSOR NETWORKS: A SURVEY 117
Guard Interval
Beacon
Beacon
Wake-up PAN Active Inactive
Wake-up
PAN Coordinator
Coordinator Active Inactive Inactive Post Beacon Delay
and ISA-100.11a favorable in industrial applications. A sys- data delivery from the common active period to the sleep
tematic comparison between WirelessHART and ISA-100.11a period. The common active period is used for arranging data
can be found in [77]. The IEEE 802.15.4e is also under devel- transmission in the sleep period. Current scheduling methods
opment for considering the real-time aspects [78]. Surveys on are good at delay reduction for individual packets but are very
WSN technologies for industrial automation are also available vulnerable to interference. It is highly demanded to design a
in [79], [80]. more robust scheduling scheme that could efficiently utilize
the sleep period for data transmission. Synchronous MAC
VII. C ONCLUSION AND FUTURE WORK protocols may gradually evolve to traffic-adaptive TDMA
In this article we have surveyed the recent developments in schemes, which utilize the time in the sleep period wisely by
the design of WSN MAC protocols. We classify WSN MAC updating traffic condition during the common active period. In
protocols into four categories: asynchronous, synchronous, fact, we have seen such a paradigm in TRAMA [50], but the
frame-slotted, and multichannel. The classification aims at channel utilization is low due to the inefficient slot assignment
identifying the research trend of WSN MAC protocols based and the delay is high because nodes that fail to claim slots
on techniques they employ. We show that throughput and delay in the random period cannot access the channel in the entire
metrics are also being considered besides energy efficiency cycle. Moreover, the downstream nodes are not notified in
in WSN MAC protocols when time synchronization and advance and thus they will not reserve time slots for use. The
multichannel are gradually supported. end-to-end delay is high. More future work can be done under
Energy saving by putting nodes into low-power sleep mode this framework.
periodically is a fundament mechanism in WSN MAC proto- In TDMA, slot stealing helps to improve the channel
cols. Asynchronous MAC protocols have integrated the predic- utilization under low contention, but it incurs high energy
tion mechanism to estimate the best wake-up time for sending. consumption as all nodes have to wake up to receive potential
Recently, the responsibility of establishing communication is data in a slot. Assigning time slots only to nodes that are
gradually shifted from the sender side to the receiver side. on active routes can increase channel utilization without
Although the transition is reasonable since only when the incurring too much overhead, but there are several issues that
receiver is ready to receive the sending is effective, quick and require further study. First, a mechanism is needed to rapidly
proper response to link breaks and target receivers’ leave is inform nodes of incoming traffic. Second, a lightweight time
a potential issue. It is also challenging to minimize the idle slot assignment algorithm is needed for dynamic time slot
listening of senders while guaranteeing that the sender will assignment among nodes on the active routing paths. Third,
not miss the beacon of the receiver. In other words, although how to utilize slots that are claimed by a node but left unused
LPP-based MAC protocols provide higher throughput, the is of interest.
energy efficiency is generally lower than that of LPL-based Scheduling senders in TDMA wakes all potential receivers
MAC protocols in light traffic load scenarios because channel up. Although scheduling receivers in TDMA leads to fewer
sampling duration is short in LPL-based MAC protocols operations of turning radio on, the strategy deviates away
but idle listening duration for a beacon is slightly longer. from the original goal of TDMA (i.e., collision-free data
Which one is more appropriate is application dependent. In transmission). It is thus necessary to address contentions
asynchronous MAC protocols, nodes’ random and independent among multiple senders efficiently.
schedules result in a long initial delay for event report. These To further boost network throughput, multichannel MAC
are the potential research directions in asynchronous MAC protocols became a hot topic. One challenge for future re-
protocols. search is the design of dynamic channel allocation algorithms
Synchronous MAC protocols synchronize a cluster of nodes that adapt to the dynamic traffic of sensor networks. The
to a common schedule. The trend in this branch is to move interference analysis of prior work is based on network
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
118 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
Time Slot
also challenging to design such a dynamic channel allocation
algorithm with low overhead.
11
12 Another challenge in multichannel MAC protocols is cross-
13 channel communication. For cost consideration, a sensor node
14 is usually equipped with a half-duplex radio transceiver and
15
the transceiver is unable to listen on multiple channels at the
16
same time. This implies that a node has to switch back and
Channel
17
18 forth between two channels to check whether it has data to
19 receive and whether the target receiver’s channel is clear. A
20 node is also responsible for letting its neighbors know that
21
it is going to send and thus is unable to receive. These
22
23
operations increase the overhead for a packet transmission
24 and frequent channel switch makes a node consume energy
25 faster than others. Therefore, how to perform cross-channel
communication efficiently is worth further study.
Time
The channel hopping used in industry standards is robust
(a) slotted hopping
to interference. However, the channel hopping strategies and
Time Slot
time slot assignment are under control of a central unit (i.e.,
network/system manager). To extend the network size, reliable
11
distributed TDMA/FDMA algorithms are highly desired.
12
13 Finally, most previous studies have only considered or-
14 thogonal channels. However, it is possible to utilize partially
15 overlapped channels. Some studies [81] [82] have shown
16
that the overall throughput can be improved by using non-
Channel
17
18
orthogonal channels even though the throughput on each in-
19 dividual channel may slightly drop. Although the introduction
20 of non-orthogonal channels has the potential to further boost
21 network capacity, how to utilize them wisely is an open issue.
22
As it becomes harder to model channel interference when
23
24
co-channel interference is introduced, it is more challenging
25 to design channel allocation algorithms for sensor networks,
especially when dynamic channel allocation is desired.
Time
(b) slow hopping
Time Slot R EFERENCES
[12] S. Lim, S. Kim, J. Cho, and S. An, “Medium access control with an [33] W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol
energy-efficient algorithm for wireless sensor networks,” in Personal for wireless sensor networks,” in Proc. INFOCOM, 2002, pp. 1567–
Wireless Communications, ser. Lecture Notes in Computer Science, 1576.
P. Cuenca and L. Orozco-Barbosa, Eds. Springer Berlin / Heidelberg, [34] , “Medium access control with coordinated adaptive sleeping for
2006, vol. 4217, pp. 334–343. wireless sensor networks,” IEEE/ACM Transactions on Networking,
[13] A. Bachir, D. Barthel, M. Heusse, and A. Duda, “Micro-frame preamble vol. 12, no. 3, pp. 493–506, 2004.
MAC for multihop wireless sensor networks,” in Proc. IEEE Interna- [35] T. van Dam and K. Langendoen, “An adaptive energy-efficient MAC
tional Conference on Communications (ICC), vol. 7, June 2006, pp. protocol for wireless sensor networks,” in Proc. SenSys, 2003, pp. 171–
3365 –3370. 180.
[14] M. Awenuti, P. Corsini, P. Masci, and A. Vecchio, “Increasing the [36] S. Du, A. K. Saha, and D. B. Johnson, “RMAC: A routing-enhanced
efficiency of preamble sampling protocols for wireless sensor networks,” duty-cycle MAC protocol for wireless sensor networks,” in Proc. IN-
in Proc. First Mobile Computing and Wireless Communication Interna- FOCOM, 2007, pp. 1478–1486.
tional Conference (MCWC), September 2006, pp. 117 –122. [37] Y. Sun, S. Du, O. Gurewitz, and D. B. Johnson, “DW-MAC: A low
[15] K.-J. Wong and D. K. Arvind, “SpeckMAC: low-power decentralised latency, energy efficient demand-wakeup MAC protocol for wireless
MAC protocols for low data rate transmissions in specknets,” in Proc. sensor networks,” in Proc. MobiHoc, 2008, pp. 53–62.
2nd International Workshop on Multi-hop Ad Hoc Networks: from [38] G. Lu, B. Krishnamachari, and C. S. Raghavendra, “An adaptive energy-
Theory to Reality, 2006, pp. 71–78. efficient and low-latency MAC for data gathering in wireless sensor
[16] S. Lim, Y. Ji, J. Cho, and S. An, “An ultra low power medium access networks,” in Proc. IPDPS, 2004.
control protocol with the divided preamble sampling,” in Ubiquitous [39] N. Vasanthi and S. Annadurai, “Energy efficient sleep schedule for
Computing Systems, ser. Lecture Notes in Computer Science, H. Youn, achieving minimum latency in query based sensor networks,” in Proc.
M. Kim, and H. Morikawa, Eds. Springer Berlin / Heidelberg, 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and
vol. 4239, pp. 210–224. Trustworthy Computing, vol. 2, June 2006, pp. 214–219.
[17] X. Shi and G. Stromberg, “SyncWUF: An ultra low-power MAC [40] W. Ye, F. Silva, and J. Heidemann, “Ultra-low duty cycle MAC with
protocol for wireless sensor networks,” IEEE Trans. Mobile Computing, scheduled channel polling,” in Proc. SenSys, 2006, pp. 321–334.
vol. 6, no. 1, pp. 115 –125, January 2007. [41] P. Lin, C. Qiao, and X. Wang, “Medium access control with a dynamic
[18] S. Mahlknecht and M. Bock, “CSMA-MPS: a minimum preamble duty cycle for sensor networks,” in Proc. IEEE Wireless Communica-
sampling MAC protocol for low power wireless sensor networks,” in tions and Networking Conference (WCNC), vol. 3, March 2004, pp.
Proc. IEEE International Workshop on Factory Communication Systems, 1534–1539 Vol.3.
September 2004, pp. 73 – 80. [42] Z. Chen, C. Hu, J. Liao, and S. Liu, “Protocol architecture for wireless
[19] E.-Y. Lin, J. Rabaey, and A. Wolisz, “Power-efficient rendez-vous body area network based on nRF24L01,” in Proc. IEEE International
schemes for dense wireless sensor networks,” in Proc. IEEE Interna- Conference on Automation and Logistics (ICAL’08). IEEE, 2008, pp.
tional Conference on Communications (ICC), vol. 7, June 2004, pp. 3050–3054.
3769 – 3776. [43] O. Omeni, A. Wong, A. Burdett, and C. Toumazou, “Energy efficient
[20] M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: a short medium access protocol for wireless medical body area sensor net-
preamble MAC protocol for duty-cycled wireless sensor networks,” in works,” IEEE Trans. Biomedical Circuits and Systems, vol. 2, no. 4,
Proc. SenSys, 2006, pp. 307–320. pp. 251–259, 2008.
[21] L. Bernardo, R. Oliveira, M. Pereira, M. Macedo, and P. Pinto, “A [44] A. Milenkovic, C. Otto, and E. Jovanov, “Wireless sensor networks for
wireless sensor MAC protocol for bursty data traffic,” in Proc. IEEE personal health monitoring: Issues and an implementation,” Computer
18th International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 29, no. 13-14, pp. 2521–2533, 2006.
Communications (PIMRC), September 2007, pp. 1 –5. [45] B. Latre, B. Braem, I. Moerman, C. Blondia, E. Reusens, W. Joseph,
and P. Demeester, “A low-delay protocol for multihop wireless body area
[22] H. Wang, X. Zhang, F. Nait-Abdesselam, and A. A. Khokhar, “DPS-
networks,” in Proc. 4th Annual International Conference on Mobile and
MAC: An asynchronous MAC protocol for wireless sensor networks.” in
Ubiquitous Systems: Networking & Services (MobiQuitous), 2007, pp.
Proc. 14th International Conference on High Performance Computing
1–8.
(HiPC), 2007, pp. 393–404.
[46] S. Marinkovic, E. Popovici, C. Spagnol, S. Faul, and W. Marnane,
[23] S. Liu, K.-W. Fan, and P. Sinha, “CMAC: An energy efficient MAC
“Energy-efficient low duty cycle MAC protocol for wireless body area
layer protocol using convergent packet forwarding for wireless sensor
networks,” IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 915–
networks,” in Proc. 4th IEEE Communications Society Conference on
925, 2009.
Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
[47] I. Rhee, A. Warrier, M. Aia, and J. Min, “Z-MAC: a hybrid MAC for
June 2007, pp. 11–20.
wireless sensor networks,” in Proc. SenSys, 2005, pp. 90–101.
[24] C. J. Merlin and W. B. Heinzelman, “Network-aware adaptation of [48] I. Rhee, A. Warrier, J. Min, and L. Xu, “DRAND: Distributed ran-
MAC scheduling for wireless sensor networks,” in Proc. 3rd IEEE domized TDMA scheduling for wireless ad-hoc networks,” in Proc.
International Conference on Distributed Computing in Sensor Systems MobiHoc, 2006, pp. 190–201.
(DCOSS Poster Session), June 2007. [49] S. Gobriel, D. Mosse, and R. Cleric, “TDMA-ASAP: Sensor network
[25] A. El-Hoiydi and J.-D. Decotignie, “WiseMAC: An ultra low power TDMA scheduling with adaptive slot-stealing and parallelism,” in Proc.
MAC protocol for multi-hop wireless sensor networks,” in Proc. 9th ICDCS, 2009, pp. 458–465.
International Symposium on Computers and Communications (ISCC), [50] V. Rajendran, K. Obraczka, and J. J. Garcia-Luna-Aceves, “Energy-
vol. 1, June-July 2004, pp. 244–251. efficient collision-free medium access control for wireless sensor net-
[26] , “Low power downlink MAC protocols for infrastructure wireless works,” in Proc. SenSys, 2003, pp. 181–192.
sensor networks,” Mob. Netw. Appl., vol. 10, pp. 675–690, October 2005. [51] L. Bao and J. J. Garcia-Luna-Aceves, “A new approach to channel access
[27] R. Musaloiu-E, C.-J. Liang, and A. Terzis, “Koala: Ultra-low power scheduling for Ad Hoc networks,” in Proc. MobiCom, 2001, pp. 210–
data retrieval in wireless sensor networks,” in Proc. IPSN, 2008, pp. 221.
421–432. [52] S. Chatterjea, L. van Hoesel, and P. Havinga, “AI-LMAC: an adaptive,
[28] B. Jang, J. B. Lim, and M. L. Sichitiu, “AS-MAC: An asynchronous information-centric and lightweight MAC protocol for wireless sensor
scheduled MAC protocol for wireless sensor networks,” in Proc. MASS, networks,” in Proc. 2004 Intelligent Sensors, Sensor Networks and
2008. Information Processing Conference, 2004, pp. 381–388.
[29] Y. Sun, O. Gurewitz, and D. B. Johnson, “RI-MAC: A receiver-initiated [53] W.-Z. Song, R. Huang, B. Shirazi, and R. LaHusen, “TreeMAC:
asynchronous duty cycle MAC protocol for dynamic traffic loads in Localized TDMA MAC protocol for real-time high-data-rate sensor
wireless sensor networks,” in Proc. SenSys, 2008, pp. 1–14. networks,” in Proc. PerCom, 2009.
[30] P. Dutta, S. Dawson-Haggerty, Y. Chen, C.-J. M. Liang, and A. Terzis, [54] G. P. Halkes and K. G. Langendoen, “Crankshaft: an energy-efficient
“Design and evaluation of a versatile and efficient receiver-initiated link MAC-protocol for dense wireless sensor networks,” in Proc. EWSN,
layer for low-power wireless,” in Proc. SenSys, 2010, pp. 1–14. 2007, pp. 228–244.
[31] P. Huang, C. Wang, L. Xiao, and H. Chen, “RC-MAC: A receiver-centric [55] T. Zheng, S. Radhakrishnan, and V. Sarangan, “PMAC: An adaptive
medium access control protocol for wireless sensor networks,” in Proc. energy-efficient MAC protocol for wireless sensor networks,” in Proc.
IWQoS, 2010, pp. 1–9. IPDPS, 2005.
[32] L. Tang, Y. Sun, O. Gurewitz, and D. B. Johnson, “PW-MAC: An [56] G. Zhou, C. Huang, T. Yan, T. He, J. A. Stankovic, and T. F. Abdelzaher,
energy-efficient predictive-wakeup MAC protocol for wireless sensor “MMSN: Multi-frequency media access control for wireless sensor
networks,” in Proc. INFOCOM, 2011, pp. 1305–1313. networks,” in Proc. INFOCOM, 2006, pp. 1–13.
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.
120 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 1, FIRST QUARTER 2013
[57] J. So and N. H. Vaidya, “Multi-channel MAC for ad hoc networks: network technologies for industrial automation: The security and quality
handling multi-channel hidden terminals using a single transceiver,” in of service perspectives,” Future Internet, vol. 2, no. 2, pp. 96–125, 2010.
Proc. MobiHoc, 2004, pp. 222–233. [80] M. Paavola and K. Leiviska, “Wireless sensor networks in industrial
[58] J. Zhang, G. Zhou, C. Huang, S. H. Son, and J. A. Stankovic, “TMMAC: automation,” Factory Automation, 2010.
An energy efficient multi-channel MAC protocol for ad hoc networks.” [81] A. Mishra, V. Shrivastava, S. Banerjee, and W. Arbaugh, “Partially
in Proc. ICC, 2007, pp. 3554–3561. overlapped channels not considered harmful,” in Proc. SIGMETRICS,
[59] “CC2420 datasheet,” http://www.ti.com. 2006, pp. 63–74.
[60] H. K. Le, D. Henriksson, and T. Abdelzaher, “A practical multi-channel [82] X. Xu, J. Luo, and Q. Zhang, “Design of non-orthogonal multi-channel
media access control protocol for wireless sensor networks,” in Proc. sensor networks.” in Proc. ICDCS, 2010, pp. 358–367.
IPSN, 2008, pp. 70–81.
[61] Y. Wu, J. A. Stankovic, T. He, J. Lu, and S. Lin, “Realistic and efficient
multi-channel communications in wireless sensor networks,” in Proc.
INFOCOM, 2008, pp. 1193–1201.
[62] Q. Yu, J. Chen, Y. Fan, X. Shen, and Y. Sun, “Multi-channel assignment Pei Huang received the BS with distinction and MS degrees in electrical
in wireless sensor networks: a game theoretic approach,” in Proc. engineering from Southwest Jiaotong University, China, in 2005 and 2008,
INFOCOM, 2010, pp. 1127–1135. respectively. Currently, he is a research assistant with the Michigan State
[63] O. D. Incel, L. van Hoesel, P. Jansen, and P. Havinga, “MC-LMAC: University Computer Science and Engineering Department, where he is
A multi-channel MAC protocol for wireless sensor networks,” Ad Hoc pursuing his PhD degree. His research interests include the areas of wireless
Netw., vol. 9, pp. 73–94, January 2011. communication, wireless ad hoc and sensor networks, and cognitive radio
[64] Y. Kim, H. Shin, and H. Cha, “Y-MAC: An energy-efficient multi- networks.
channel MAC protocol for dense wireless sensor networks,” in Proc.
IPSN, 2008, pp. 53–63.
[65] J. Borms, K. Steenhaut, and B. Lemmens, “Low-overhead dynamic
multi-channel MAC for wireless sensor networks,” in Proc. EWSN,
2010, pp. 81–96. Li Xiao received the BS and MS degrees in computer science from North-
[66] IEEE Standard for Local and metropolitan area networks - Part 15.4: western Polytechnic University, China, and the PhD degree in computer
Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Std. science from the College of William and Mary in 2002. She is an associate
802.15.4-2011, September 2011. professor of computer science and engineering at Michigan State University.
[67] B. Villaverde, R. De Paz Alberola, S. Rea, and D. Pesch, “Exper- Her research interests are in the areas of distributed and networking systems,
imental evaluation of beacon scheduling mechanisms for multihop overlay systems and applications, and wireless networks. She is a senior
IEEE 802.15.4 wireless sensor networks,” in Proc. 4th International member of the IEEE.
Conference on Sensor Technologies and Applications (SENSORCOMM),
July 2010, pp. 226–231.
[68] R. Burda and C. Wietfeld, “A distributed and autonomous beacon
scheduling algorithm for IEEE 802.15.4/ZigBee networks,” in Proc.
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems Soroor Soltani is a PhD candidate in the Electrical and Computer Engineering
(MASS), October 2007, pp. 1–6. Department at Michigan State University, East Lansing, MI. She graduated
[69] H.-I. Jeon and Y. Kim, “BOP (beacon-only period) and beacon schedul- with BE in Electrical and Communication Engineering with distinction from
ing for MEU (mesh-enabled USN) devices,” in Proc. 9th International Kuwait University, Kuwait in 2005. She received her MS in Electrical
Conference on Advanced Communication Technology, vol. 2, February Engineering from the Michigan State University, MI, in 2008. Her expertise
2007, pp. 1139 –1142. and research interests lie in wireless cognitive radio mesh networks operating
[70] E.-J. Kim and H.-H. Choi, “EBBS: Energy-efficient BOP-based beacon in urban areas, and multimedia communication over stochastic networks. She
transmission scheduling for WSNs,” in Proc. IEEE 19th International is a student member of the IEEE.
Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC), September 2008, pp. 1–6.
[71] A. Koubaa, A. Cunha, and M. Alves, “A time division beacon schedul-
ing mechanism for IEEE 802.15.4/Zigbee cluster-tree wireless sensor
Matt W. Mutka received the BS degree in electrical engineering from the
networks,” in Proc. 19th Euromicro Conference on Real-Time Systems
University of Missouri-Rolla, the MS degree in electrical engineering from
(ECRTS), July 2007, pp. 125–135.
Stanford University, and the PhD degree in Computer Sciences from the
[72] B. C. Villaverde, S. Rea, and D. Pesch, “Guaranteeing reliable com- University of Wisconsin-Madison. He is on the faculty of the Department
munications in mesh beacon-enabled IEEE802.15.4 WSN for industrial of Computer Science and Engineering at Michigan State University, where
monitoring applications,” in Proc. 2nd International ICST Conference he is currently professor and chairperson. He has been a visiting scholar at the
on Ad Hoc Networks (ADHOCNETS), 2010, pp. 359–370. University of Helsinki, Helsinki, Finland, and a member of technical staff at
[73] “ZigBee Alliance,” http://www.zigbee.org/. Bell Laboratories in Denver, Colorado. His current research interests include
[74] T. Lennvall, S. Svensson, and F. Hekland, “A comparison of Wire- mobile computing, sensor networking, wireless networking and multimedia
lessHART and ZigBee for industrial applications,” in Proc. IEEE networking.
International Workshop on Factory Communication Systems (WFCS),
May 2008, pp. 85 –88.
[75] HART Field Communication Protocol Specification, Revision 7.0, HART
Communication Foundation Std., September 2007.
[76] Wireless Systems for Industrial Automation: Process Control and Re- Ning Xi received his D.Sc. degree in Systems Science and Mathematics
lated Applications, Std. ISA-100.11a-2009, 2009. from Washington University in St. Louis, Missouri in December, 1993, and
[77] S. Petersen and S. Carlsen, “WirelessHART Versus ISA100.11a: The B.S. degree in electrical engineering from Beijing University of Aeronautics
format war hits the factory floor,” IEEE Industrial Electronics Mag., and Astronautics. He is the University Distinguished Professor and John D.
vol. 5, no. 4, pp. 23–34, December 2011. Ryder professor of Electrical and Computer Engineering at Michigan State
[78] F. Chen, R. German, and F. Dressler, “Towards IEEE 802.15.4e: A study University. Currently, he serves as the Head and Chair Professor of the
of performance aspects,” in Proc. 8th IEEE International Conference Department of Mechanical and Biomedical Engineering, the City University
on Pervasive Computing and Communications Workshops (PERCOM of Hong Kong. Dr. Xi is a fellow of IEEE. Currently, his research interests
Workshops), April 2010, pp. 68–73. include robotics, manufacturing automation, micro/nano manufacturing, nano
[79] D. Christin, P. S. Mogre, and M. Hollick, “Survey on wireless sensor sensors and devices, and intelligent control and systems.
Authorized licensed use limited to: LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING. Downloaded on September 30,2024 at 15:36:58 UTC from IEEE Xplore. Restrictions apply.