Physical and Link Layermchang/cs450/CS450.FA2013.Week.03.MAC.pdfContention-Based Protocols a b c...

Preview:

Citation preview

Network Embedded Systems

Sensor Networks

Physical and Link Layer

Marcus Chang, mchang@cs.jhu.edu

Slides: Andreas Terzis

1

Physical Layer

2 Image: Dino.korah

PHY Layer Motivation

Nodes communicate over wireless channel

Characteristics of wireless channel and transceiver have impact on all upper layer protocols

Transmission range

Loss rate

Energy consumption

Why?

Understand performance of existing systems

Guide design of future systems

3

Communication System

Fundamental parameters that control rate and quality of information exchange are the channel bandwidth B and the signal power S

Bandwidth: range of frequencies that the channel can transmit

Increasing signal power reduces the effect of channel noise

4

Signal Types Analog signals

Discrete signals can be generated by sampling analog signals

Digital signals

Information signal (baseband) Example: sequence of bits we want

to transmit Low frequency signals do not travel

well through most mediums such as wires, and wirelessly through air.

To transmit them over long distances requires a form of modification called modulation

Carrier signal: A carrier is a pure sinusoid of one

particular frequency and of a certain phase.

5

Example: Amplitude Modulation (AM)

Carrier: sin(2πfct)

Signal: I(t)

Signal modulates the carrier’s amplitude

I(t)×sin(2πfct)

6

Modulating Digital Signals

Similar concept but information signal is digital

Amplitude Shift Keying (ASK)

Frequency Shift Keying (FSK)

Phase Shift Keying (PSK)

Can use multiple amplitudes, frequencies, phases

Combinations of amplitude and phase manipulations (e.g., QAM)

7

Example: 802.15.4

Modulation

4-bit symbols are mapped to one of 16 pseudo-random 32-chip sequences

Modulation in the 2.4 GHz range is Offset-Quadrature Phase Shift Keying (O-QPSK) with half-sine chip shaping

Demodulation

Incoming 32-chip sequences are mapped to the symbol with the shortest Hamming distance

Redundancy enables error correction

8 Image: Texas Instruments CC2420 Datasheet

Bit Error Rate

Noise can corrupt received signal to the point that it is incorrectly decoded

Bit errors

For a given modulation scheme, bit error rate (BER) is a function of Signal-to-Noise ratio (SNR)

9

10

Signal to Noise Ratio

Noise of power N0 arrives at the sensor

SNR= Pr / N0

Usually measured in decibels: SNRdB= 10logSNR

When SNR drops below threshold signal cannot be detected

How can we increase detection range?

Quadrupling the power doubles the range

Double the carrier wavelength

Improve detection algorithm

11

Propagation Medium Losses

Propagation medium usually introduces distortion, scattering, and attenuation

Propagation loss LP

Absorption in uniform medium is a constant fractional loss per unit distance

Example: Fading due to rain as function of frequency

F(GHz) Lp (dB/km)

7.5 0.048

9.4 0.093

16 0.4

34.9 2.34

12

Obstructions

Obstructions, media changes, and reflective objects introduce further losses

Reflection

Refraction

Diffraction

Scattering

13

Log-Normal Shadowing Model

Assume average power (in dB) decreases proportional to the log of distance

Path-loss exponent n, depends on propagation environment

Environment n

Free Space 2

Urban Area 2.7-3.5

Shadowed Urban 3-5

In-building LOS 1.6 to 1.8

Obstruction in building 4 to 6

Obstruction in factories 2 to 3

PL(d) PL(do)10n logd

d0

14

Log-Normal Shadowing Model

dB)(in deviation

standard with dB)(in r.vGaussian mean -zero is

X

PL(d) PL(do)10n logd

d0

Statistically describes random shadowing effects

values of n and σ are computed from measured data using linear regression

Model typically derived from measurements

Log normal model found to be valid in indoor environments

Describe signal strength variations over large distances and large time scales

Telosb Radio – Texas Instruments CC2420

15

Link Layer

16

Breaking the Stack

2002 2003 2004 2005 2006 2007 1999 2000 2001 2008

Link

Network

Transport

Application S

PIN

Bro

adcast S

torm

Tin

yO

S 0

.6

Wo

oM

AC

GA

F

S-M

AC

Alo

ha P

S

PS

FQ

GD

I

CO

DA

Min

tRo

ute

T-M

AC

RM

ST

B-M

AC

Mu

ltih

opLQ

I

Fu

sio

n

De

luge

FP

S

Wis

eM

AC

SP

Dri

p

Dra

in

BV

R

Re

dw

oods

No

rth

Se

a

SC

P-M

AC

P

ED

AM

AC

S

X-M

AC

Vo

lcano

CT

P

Flu

sh

Go

lden G

ate

Brid

ge

S4

Dip

17

MAC and its Classification

Medium Access Control (MAC)

When and how nodes access the shared channel

Classification of multiple access MAC protocols

Scheduled protocols

Schedule nodes onto different sub-divisions

Examples: Time (TDMA), Frequency (FDMA), Code (CDMA)

Contention-based protocols

Nodes compete in probabilistic coordination

Examples: ALOHA (pure & slotted), Carrier Sense (CSMA)

18

19

MAC Attributes

Collision avoidance

Basic task of a MAC protocol

Energy efficiency

Scalability and adaptivity

Network size, node density and topology change

Channel utilization

Latency

Throughput

Fairness

Primary

Secondary

20

Energy Efficiency in MAC Design

What causes energy waste?

Packet collisions

Control packet overhead

Overhearing unnecessary traffic

Long idle time

Bursty traffic in sensornet applications

Idle listening consumes 50—100% of the power for receiving

Terminology

Wakeup period (time between wakeups)

Duty Cycle = listen period/Wakeup period

21

Scheduled Protocols

TDMA

Advantages

No collisions

Energy efficient — easily support low duty cycles

Disadvantages

Bad scalability and adaptivity

Difficult to accommodate node changes

Difficult to handle inter-cluster communication

Requires time synchronization

22

Polling

A special TDMA without pre-assigned slots

A master plus one or more slaves (star topology)

The master node decides which slave can send by polling the corresponding slave

Only direct communication between the master and a slave

Examples

IEEE 802.11 infrastructure mode (CFP)

Bluetooth piconets

Scheduled Protocols

23

CSMA — Carrier Sense Multiple Access

Listening before transmitting

Collisions can still occur

Examples

IEEE 802.11 – CSMA/CA

Collision Avoidance – random back-off time

Problem

Solution Explicit Request-to-Send and Clear-to-Send (RTS/CTS) packets

Contention-Based Protocols

a b c

Hidden terminal: a is hidden from c’s carrier sense

24

Case Study: S-MAC

S-MAC — by Ye, Heidemann and Estrin

Tradeoffs

Increase latency and decrease fairness to improve energy efficiency

Major components in S-MAC

Periodic listen and sleep

Collision avoidance

Overhearing avoidance

Message passing

From “Medium Access Control With Coordinated Adaptive

Sleeping for Wireless Sensor Networks” by Ye et al.

25

Coordinated Sleeping

Problem:

Idle listening consumes significant energy

Solution:

Periodic listen and sleep

Turn off radio when sleeping

Reduce duty cycle to ~ 10% (120ms on/1.2s off)

sleep listen listen sleep

26

Coordinated Sleeping

Schedules can differ

Nodes prefer neighboring nodes that have same schedule

Border nodes: two schedules

Node 1

Node 2

sleep listen listen sleep

sleep listen listen sleep

Schedule 2

Schedule 1

27

Coordinated Sleeping

Schedule Synchronization

New node tries to follow an existing schedule

Remember neighbors’ schedules

— to know when to send to them

Each node broadcasts its schedule every few periods of sleeping and listening

Re-sync when receiving a schedule update

Periodic neighbor discovery

Keep awake in a full sync interval over long periods

28

Collision Avoidance

S-MAC is based on contention

Similar to IEEE 802.11 ad hoc mode (DCF)

Physical and virtual carrier sense

Randomized backoff time

RTS/CTS for hidden terminal problem

RTS/CTS/DATA/ACK sequence

29

Adaptive Listening

Reduce multi-hop latency due to periodic sleep

Wake up for a short period of time at end of each transmission

Reduces latency by half

4 1 2 3

CTS

RTS

CTS

listen listen

t1 t2

receive send Node 3:

t0

30

Overhearing Avoidance

Problem: Receive packets destined to others

Solution: Sleep when neighbors talk

But only use in-channel signaling (RTS/CTS)

Who should sleep?

All immediate neighbors of sender and receiver

How long to sleep?

The duration field in each packet informs other nodes the sleep interval

31

Adaptive Listen Slots

In S-MAC all nodes have listen slots of the same duration

Different nodes might have different Tx/Rx patterns

Idle listening wastes power

Idea: adaptively change the idle listen slot

“An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks” (aka T-MAC) by T. van Dam, K. Langendoen

Principle

Node periodically wakes up, turns radio on and checks channel

Wakeup time fixed, “Check time” variable

If energy is detected, node powers up in order to receive the packet

Noise floor estimation used to detect channel activity during LPL

Low Power Listening (B-MAC)

32 From “Versatile Low Power Media Access for Wireless Sensor Networks” by Polastre et al.

Low Power Listening

Node goes back to sleep

If a packet is received

After a timeout

Preamble length matches channel checking period

No explicit synchronization required

Thursday’s paper!

33

LPL Limitations

Overhearing: Non-targeted receivers who sample the channel during preamble transmission have to wait until the end of the preamble to go back to sleep

Energy expenditure is a function of density as well as traffic load

Entire preamble needs to be sent before data transmission

Even though on average receiver wakes up half way through the preamble

Multiple senders need to wakeup the same receiver

34

X-MAC

Preamble contains destination ID Other receivers can

return to sleep

Strobed preamble Receiver sends ACK after

receiving short preamble

Receiver stays awake after packet reception Transmissions from

pending senders can proceed without additional preambles

35

From “X-MAC: A Short Preamble MAC Protocol for

Duty-Cycled Wireless Sensor Networks” by

Buettner et al.

36

Scheduled Listening and LPL

Scheduled listening

Advantage

Efficient transmission

Disadvantage

Synchronization overhead

Low-Power Listening

Advantage

minimizes listen cost when no traffic

Disadvantage

high costs on transmission

37

Scheduled Channel Polling (SCP-MAC)

SCP synchronizes neighbor’s channel polling time A short wake up tone wakes up receiver

It is efficient for both unicast and broadcast packets

From “Ultra-Low Duty Cycle MAC with Scheduled Channel Polling”

by Ye et al.

“You talkin’ to me?”

Inherent problem with LPL

Overhearing increases idle listening

WiFi can trigger overhearing

38 From “Design and Evaluation of a Versatile and Efficient Receiver-

Initiated Link Layer for Low-Power Wireless” by Dutta et al.

Receiver Initiated MAC

Goal:

Reduce idle overhearing in dense networks

RI-MAC

Sender does the idle listening

Receiver transmits beacons

Implementation part of the final project!

39 From “RI-MAC: A Receiver-Initiated Asynchronous Duty Cycle MAC Protocol for Dynamic

Traffic Loads in Wireless Sensor Networks” by Sun et al.

Recap: Koala network architecture

40

Soil Monitoring

Reliable data collection

Long network lifetime

Robustness to failures

Flexibility

Design outline

Motes collect measurements to local flash

Sleep most of the time (> 99%) to conserve energy

Gateway periodically wakes up the network to retrieve mote measurements

Low Power Probing

Context

Nodes sleep for weeks without radio contact

Clocks drift out of synchronization

Problem

How to resynchronize with a minimum of control packets?

No explicit acknowledgement with sender initiated wakeup

Difficult to determine when to actually stop wakeup process

41

Low Power Probing

Receiver Initiated Wakeup

Nodes send periodic beacons while sleeping

After each beacon, nodes listen for acknowledgement

Node remains awake when acknowledgement is received

Nodes that are awake acknowledges other beacons

One node initializes network wide wakeup by acknowledging the other nodes’ beacons

Result: wakeup spreads like flood wave from origin

Benefits:

Nodes can collect neighborhood information from beacons

Use neighborhood information to detect missing nodes

42

Simulcast / Concurrent Transmissions

Medium Access Control

Avoid Packet Collisions

Are all packet collisions harmful?

Simulcast / Concurrent Transmissions

Radio waves can interfere constructively and destructively

Precisely timed, identical radio packets can be decoded

Capture effect:

AGC locks onto the signal with highest SNR

Non-destructive inference:

Amplitude differences inhibits signal cancellation caused by phase differences in carrier wave

43

Simulcast / Concurrent Transmissions

Insteon

Commercial company specializing in home automation

Insteon Demo

Glossy

Rediscovered in 2011 by Ferrari et al.

TDMA based

Time synchronization for free

Flooding vs. point-to-point

LPL or LPP control packets equivalent to flooding

No hidden terminals

No routing

44

Summary

Physical Layer

Medium Access Control

Scheduled

Contention

[A-Z]-MAC

Next week:

Link Estimation and Routing

45

Schedule

46

Week 1: Introduction and Hardware

Week 2: Embedded Programming

Week 3: Medium Access Control

Week 4: Link Estimation and Tree Routing

Week 5: IP Networking

Week 6: Near Field Communication

Week 7: (seminar, no lecture)

Week 8: Energy Management

Week 9: Review and Midterm

Week 10: Time Synchronization

Week 11: Localization

Week 12: Energy Harvesting

Week 13: (seminar, no lecture)

Week 14: TBD

Recommended