3. Introduction
Wireless Sensor Networks are typically composed of a large number
of low-cost, low-power, multifunctional wireless devices deployed
over a geographical area in an ad hoc fashion and without careful
planning. sensing devices are resource constrained and therefore are
only capable of a limited amount of processing and communication.
4. The choice of the medium access control protocol is the major determining factor in
WSN performance
the MAC protocol functionalities are provided by the lower sublayer of the data link
layer (DLL). The higher sublayer of the DLL is referred as the logical link control
(LLC) layer.
Background
5. The MAC sublayer resides directly above the physical layer. It supports the
following basic functions:
âą Framing â Define the frame format and perform data encapsulation and
decapsulation for communication between devices.
âą Reliability â Ensure successful transmission between devices. (by sending acknowledgement
(ACK) messages and retransmissions when necessary).
âą Flow Control â Prevent frame loss (swamping) through overloaded recipient buffers.
âą Error Control â Use error detection or error correction codes to control the
amount of errors present in frames delivered to upper layers.
âą Medium Access â Control which devices participate in communication at any time. Medium
access becomes a main function of wireless MAC protocols since broadcasts easily cause data
corruption through collisions.
6. Why do we need MAC?
â Wireless channel is a shared medium.
â Radios transmitting in the same frequency band interfere with each other.
The role of Medium Access Control
â Controls when and how each node can transmit in the wireless channel.
â Solves the contention and collision.
7. Performance Requirements
In trying to determine the performance requirements of MAC protocols, the scope
of research has been very broad, issues such as :
ï Delay: refers to the amount of time spent by a data packet in the MAC layer
before it is transmitted successfully.
ï Throughput: typically defined as the rate at which messages are serviced by a
communication system. It is usually measured either in messages per second or
bits per second.
ï Robustness: defined as a combination of reliability, availability, and
dependability requirements, reflects the degree of the protocol insensitivity to
errors and misinformation.
8. Performance Requirements
ï Scalability: refers to the ability of a communications system to meet its
performance characteristics regardless of the size of the network or the number
of competing nodes.
ï Stability: refers to the ability of a communications system to handle
fluctuations of the traffic load over sustained periods of time.
ï Fairness: A MAC protocol is considered to be fair if it allocates channel
capacity evenly among the competing communicating nodes without unduly
reducing the network throughput.
ï Energy: a sensor node is equipped with one or more integrated sensors,
embedded processors with limited capability, and short-range radio
communication ability.
9. Major Sources of Energy Wastes
â Control Packet Overhead
E.g., RTS/CTS
â Collision (RTS: Request To Send)
Retransmission (CTS: Clear To Send)
â Overhearing
The receiver of a packet is not the intended receiver of that packet
â Idle Listing
Listening to possible traffic that is not sent
11. Fixed-Assignment Protocols ( Channelized protocol) In fixed-assignment strategies,
each node is allocated a predetermined fixed amount of the channel resources. his
category include frequency-division multiple access (FDMA), time-division multiple
access (TDMA), and code-division multiple access (CDMA).
Random Assignment Protocols In fixed-assignment schemes, each communicating
node is assigned a frequency band in FDMA systems or a time slot in TDMA systems.
This assignment is (static)
The ALOHA protocol (dynamic), also referred to as pure ALOHA, was one of the first
such media access protocols. improve the performance of pure ALOHA lead to the
development of several schemes, including carrier sense multiple access (CSMA),
carrier-sense multiple access with collision detection (CSMA/CD), and carrier-sense
multiple access with collision avoidance (CSMA/CA)
Type of Multiple Access protocol
14. ï Every node senses the carrier before transmitting
ï If the carrier is not clear, the node defers transmission for a specified period
Otherwise, transmits.
ï While transmitting, the sender is listening to carrier and sender stops
transmitting if collision has been detected.
CSMA/CD (carrier sense multiple access/ collision detection)
16. Classification of MAC Protocols
ïŒ Contention-based protocols ( S-MAC , B-MAC )
1. S-MAC
ï Basic Idea
Trades energy efficiency for lower throughput and higher latency
ï Main Components
Periodic Listen and Sleep
Collision Avoidance
Overhearing Avoidance
Message Passing
17. Periodic Listen and Sleep
â Nodes periodically sleep
â Turn off radio when sleeping
â Reduce duty cycle to ~10%
â Trades energy efficiency for lower throughput and higher latency
Classification of MAC Protocols
18. Collision Avoidance
â Similar to IEEE 802.11
â Virtual Carrier Sense
â NAV (Network Allocation Vector)
â Physical Carrier Sense
â Four-way(steps) handshake
â RTS/CTS/DATA/ACK
Classification of MAC Protocols
19. Overhearing Avoidance
â The Basic Idea a node can go to sleep whenever its neighbor is talking with
another node.
â Who should sleep?
The immediate neighbors of sender and receiver.
â How do they know when to sleep?
By overhearing RTS or CTS.
â How long should they sleep?
NAV (Network Allocation Vector).
Classification of MAC Protocols
20. Message Passing
How to transmit a long message?
â Transmit it as a single long packet (Easy to be corrupted).
â Transmit as many independent packets (Higher Control Overhead & Longer Delay).
â Divide into fragments, but transmit all in burst.
Classification of MAC Protocols
21. Classification of MAC Protocols
2. B-MAC
ï B-MAC is implemented in TinyOS.
ï Major Feature: reconfigurable.
â Above B-MAC, one can implement an RTS-CTS scheme or a TDMS like
scheduling protocol.
ï A small core of media access functionality
â arbitration, reliability, low power communication
22. 2. B-MAC (Overview)
â Channel Arbitration
Clear Channel Assessment (CCA) & Backoffs
â Reliability
Link-layer acknowledgment
â Low Power Communication
Low Power Listening (LPL)
Classification of MAC Protocols
23. Classification of MAC Protocols
ïŒ Schedule-based MAC Protocols for WSNs
(Traditional TDMA MAC Protocols)
â Divide time into cycles
A cycle consists of several slots
â Advantages
Collision-Free, Low Idle Listing and Overhearing.
â Disadvantages
Synchronization, Low Channel Utilization
â An important Issue
Slot Assignment Strategy
24. Slot Assignment Strategy
A node should own a slot different from its one-hop and two-hop neighbors
Classification of MAC Protocols
26. 1. Z-MAC (Zebra MAC)
â A hybrid TDMA and CSMA MAC scheme
â The main feature is its adaptability to the level of contention in the network
â under low contention, it behaves like CSMA, and
â under high contention, like TDMA
Classification of MAC Protocols
27. Funneling-MAC
â The authors propose a localized, sink-oriented funneling-MAC
â Localized
Using local TDMA scheduling in the intensity region only
â Sink-oriented
Manage TDMA scheduling
Compute and maintain the depth of the intensity region
Classification of MAC Protocols
28. Conclusion
â MAC Protocols in WSNs
â Energy Efficiency and Other Concerns
â Contention-based/Schedule-based/Hybrid