Download - Radio and Medium Access Control
![Page 1: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/1.jpg)
1
Radio and Medium Access Control
![Page 2: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/2.jpg)
2
Radio Properties
![Page 3: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/3.jpg)
3
Some Basic Concepts
• RSSI
• dbm
• Noise floor: see wikipedia
• CCA thresholding algorithms
• Duty cycle
• LPL
![Page 4: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/4.jpg)
4
Signal Transmission
Ref: Fig. 2.9 of “Wireless Communications and Networks” by William Stallings
![Page 5: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/5.jpg)
5
Packet Reception and Transmission
• Ref: [Hardware_1] Figure 5
![Page 6: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/6.jpg)
6
Signal
• An electromagnetic signal– A function of time– Also a function of frequency
• The signal consists of components of different frequencies
![Page 7: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/7.jpg)
7
802.15.4 Physical Layer
![Page 8: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/8.jpg)
8
dB• dB (Decibel)
– Express relative differences in signal strength– dB = 10 log10 (p1/p2)– dB = 0: no attenuation. p1 = p2– 1 dB attenuation: 0.79 of the input power survives:
10 * log10(1/0.79)– 3 dB attenuation: 0.5 of the input power survives:
10 * log10(1/0.5)– 10 dB attenuation: 0.1 of the input power survives:
10 * log10(1/0.1)• http://en.wikipedia.org/wiki/Decibel
• http://www.sss-mag.com/db.html
![Page 9: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/9.jpg)
9
dBm
• The referenced quantity is one milliwatt(mW)
• dBm = 10 log10 (p1/1mW)
• 0 dBm: p1 is 1 mW
• -80 dBm: p1 is 10-11W = 10pW
• http://en.wikipedia.org/wiki/DBm
![Page 10: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/10.jpg)
10
Received Signal Strength Indicator (RSSI)
• The strength of a received RF signal
• Many current platforms provide hardware indicator– CC2420, the radio chip of MicaZ and TelosB,
provides RSSI indicator and LQI (Link Quality Indicator)
![Page 11: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/11.jpg)
11
LQI (Link Quality Indicator)
• A measure of chip error rate
• Error rate– The rate at which errors occur– Error
• 0 is transmitted while 1 is received
• 1 is transmitted while 0 is received
![Page 12: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/12.jpg)
12
Noise Floor
• The measure of the signal created from the sum of all the noise sources and unwanted signals
![Page 13: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/13.jpg)
13
Signal Noise Ratio (SNR)
• The ratio of the power in a signal to the power contained in the noise that is present
• Typically measured at the receiver• Take CC2420 as the example:
– Noise Floor: the RSSI register from the CC2420 chip when not receiving a packet
• For example -98dBm
– The strength field from the received packet: RSSI of the received packet
![Page 14: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/14.jpg)
14
Radio Spectrum Frequency Allocation
• http://www.ntia.doc.gov/osmhome/allochrt.pdf
![Page 15: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/15.jpg)
ref: [radio_1]
Radio Irregularity
• Spherical radio range is not valid
• When an electromagnetic signal propagate, the signal may be– Diffracted– Reflected– Scattered
• Radio irregularity and variations in packet loss in different directions
![Page 16: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/16.jpg)
[Radio_1] Figure 1 16
Radio Signal Property
• Anisotropic Signal Strength: Different path losses in different directions
-65-64-63-62-61-60-59-58-57-56-55
0 25 50 75
Beacon SeqNo
South NorthWest East
Figure 1: Signal Strength over Time in Four Directions
![Page 17: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/17.jpg)
[Radio_1]: Figure 3 17
Radio Signal Property
• Anisotropic Packet Loss Ratio: Packet Reception Ratio (PRR) varies in different directions
![Page 18: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/18.jpg)
[Radio_1]: Figure 4 18
Radio Signal Property• Anisotropic Radio Range: The communication
range of a mote is not uniform
![Page 19: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/19.jpg)
19
Medium Access Control (MAC)
![Page 20: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/20.jpg)
20
Introduction
• A radio channel cannot be accessed simultaneously by two or more nodes that are in a radio interference range– Nodes may transmit at the same time on the same
channel
• Medium Access Control– On top of Physical layer– Control access to the radio channel
![Page 21: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/21.jpg)
21
MAC Protocol Requirements • Energy Efficiency
– Sources of energy waste• Collision, Idle Listening, Overhearing, and Control Packet
Overhead
• Effective collision avoidance– When and how the node can access the medium and send
its data
• Efficient channel utilization at low and high data rates– Reflects how well the entire bandwidth of the channel is
utilized in communications
• Tolerant to changing RF/Networking conditions• Scalable to large number of nodes
Ref: [MAC_2] Section I, II
![Page 22: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/22.jpg)
[MAC_3]: Section 4 22
Two Basic Classes of MAC Protocol – Slotted and Sampling
• Slotted Protocols– Nodes divides time into slots
– Radio can be in receive mode, transmit mode, or powered off mode
– Communication is synchronized
– Data transfers occur in “slots”
– TDMA, IEEE 802.15.4, S-MAC, T-MAC, etc.
• Also Ref: J. Polastre Dissertation – Section 2.4: http://www.polastre.com/papers/polastre-thesis-final.pdf
![Page 23: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/23.jpg)
23
Two Basic Classes of MAC Protocol – Slotted and Sampling
• Sampling Protocols– Nodes periodically wake up, and only start
receiving data if they detect channel activity– Communication is unsynchronized– Data transfer wakes up receiver– Must send long, expensive messages to wake up
neighbors– B-MAC, Preamble sampling, LPL, etc.
![Page 24: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/24.jpg)
24
Slotted Protocol Example: 802.15.4
• Each node beacons on its own schedule
• Other nodes synchronize with the received Beacons
Bea
con
Bea
con
Superframe Duration
Beacon Frame Duration
sleep
Dat
a
Dat
a
Ack
CSMA Contention Period
![Page 25: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/25.jpg)
25
IEEE 802.15.4 Superframe
![Page 26: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/26.jpg)
26
Using 802.15.4
RF Channel
15.4
SPwake forbeacon period
start radiosend beacon
Be
aco
n
beaconTX
are messagespending?
If yes,wake up
send
Da
ta
beaconRX
senddone
TX firstpacket
packetRX
Da
ta
Ack
TXdone
Ackreceived
send donereliability set
packetreceived
stop radiosuperframe complete
Stopradio
SP
15.4
Coordinator
Neighbors
Updateschedule
![Page 27: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/27.jpg)
27
Main MAC ProtocolsWireless medium access
Centralized
Distributed
Contention-based
Schedule-based
Fixedassignment
Demandassignment
Contention-based
Schedule-based
Fixedassignment
Demandassignment
![Page 28: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/28.jpg)
[MAC_2]: Figure 1 28
Scheduled Protocols
• TDMA divides the channel into N time slots
![Page 29: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/29.jpg)
[MAC_2]: Section IV 29
Contention-based Protocols
• A common channel is shared by all nodes and it is allocated on-demand
• A contention mechanism is employed• Advantages over scheduled protocols
– Scale more easily– More flexible as topologies change– No requirement to form communication clusters– Do not require fine-grained time synchronization
• Disadvantage– Inefficient usage of energy
• Node listen at all times• Collisions and contention for the media
![Page 30: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/30.jpg)
[MAC_2]: Section IV 30
CSMA
• Listening before transmitting
• Listening (Carrier Sense)– To detect if the medium is busy
• Hidden Terminal Problem
![Page 31: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/31.jpg)
[MAC_2]: Section IV 31
Hidden Terminal Problem
• Node A and C cannot hear each other
• Transmission by node A and C can collide at node B
• On collision, both transmissions are lost
• Node A and C are hidden from each other
BA C
![Page 32: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/32.jpg)
[MAC_2]: Section IV 32
CSMA-CA
• CA– Collision Avoidance: to address the hidden
terminal problem
• Basic mechanism– Establish a brief handshake between a sender and a
receiver before transmission– The transmission between a sender and a receiver
follows RTS-CTS-DATA-ACK
![Page 33: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/33.jpg)
33
Centralized Medium Access• Idea: Have a central station control when a node may access the
medium– Example: Polling, centralized computation of TDMA schedules– Advantage: Simple, quite efficient (e.g., no collisions), burdens
the central station• Not directly feasible for non-trivial wireless network sizes• But: Can be quite useful when network is somehow divided into
smaller groups– Clusters, in each cluster medium access can be controlled
centrally – compare Bluetooth piconets, for example
! Usually, distributed medium access is considered
![Page 34: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/34.jpg)
34
Schedule- vs. Contention-based MACs
• Schedule-based MAC – A schedule exists, regulating which participant may use
which resource at which time (TDMA component) – Typical resource: frequency band in a given physical
space (with a given code, CDMA)– Schedule can be fixed or computed on demand
• Usually: mixed – difference fixed/on demand is one of time scales
– Usually, collisions, overhearing, idle listening no issues – Needed: time synchronization!
![Page 35: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/35.jpg)
35
Schedule- vs. Contention-based MACs
• Contention-based protocols– Risk of colliding packets is deliberately taken – Hope: coordination overhead can be saved,
resulting in overall improved efficiency– Mechanisms to handle/reduce probability/impact
of collisions required
– Usually, randomization used somehow
![Page 36: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/36.jpg)
36
Possible Solutions
• CSMA (Carrier Sense Multiple Access)– Advantage:
• No clock synchronization required
• No global topology information required
– Disadvantage• Hidden terminal problem: serious throughput
degradation
• RTS/CTS can alleviate hidden terminal problem, but incur high overhead
![Page 37: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/37.jpg)
37
Possible Solutions
• TDMA (Time-division multiple access)– Advantage
• Solve the hidden terminal problem without extra message overhead
– Disadvantage• It is challenging to find an efficient time schedule• Need clock synchronization
– High energy overhead
• Handling dynamic topology change is expensive• Given low contention, TDMA gives much lower
channel utilization and higher delay
![Page 38: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/38.jpg)
38# of Contenders
Channel Utilization
TDMACSMA
IDEAL
Effective Throughput CSMA vs. TDMA
Sensitive to Time synch. errors,
Topology changes,
Slot assignment errors.
Do not use any topology or time synch. Info.
Thus, more robust to time synch. errors and changes.
![Page 39: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/39.jpg)
[MAC_2]: Section II.B 39
Four important sources of wasted energy in WSN:
– Idle Listening (required for all CSMA protocols)– Overhearing (since RF is a broadcast medium)– Collisions (Hidden Terminal Problem)– Control Overhead (e.g. RTS/CTS or
DATA/ACK)
MAC Energy Usage
![Page 40: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/40.jpg)
40
B-MAC• A set of primitives that other
protocols may use as building block• Provide basic CSMA access• Optional link level ACK, no link
level RTS/CTS• CSMA backoffs configurable by
higher layers• Carrier Sensing using Clear Channel
Assess (CCA)• Sleep/Wake scheduling using Low
Power Listening (LPL)• Ref: Section 1, 3 of ref. [MAC_1]
• LPL: See Section 2.1 of ref. [Energy_1]
![Page 41: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/41.jpg)
41
B-MAC
• Does not solve hidden terminal problem• Duty cycles the radio through periodic channel
sampling – Low Power Listening (LPL)
![Page 42: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/42.jpg)
42
B-MAC Clear Channel Assessment
- Before transmission – take a sample of the channel
- If the sample is below the current noise floor, channel is clear, send immediately.- If five samples are taken, and no outlier found => channel busy, take a random backoff- Noise floor updated when channel is known to be clear e.g. just after packet transmission
A packet arrives between 22 and 54ms. The middle graph shows the output of a thresholding CCA algorithm. ( 1: channel clear, 0: channel busy)
• Ref: Section 1, 3 of ref. [MAC_1]
![Page 43: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/43.jpg)
[MAC_1]: Figure 3 43
A Trace of Power Consumption
![Page 44: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/44.jpg)
44
B-MAC Low Power Listening
Receive data
Carrier sense
Receiver
Long Preamble Data TxSender
CheckInterval
Similar to ALOHA preamble sampling Wake up every Check-Interval Sample Channel using CCA If no activity, go back to sleep for Check-
Interval Else start receiving packet Preamble > Check-Interval
Goal: minimize idle listening
![Page 45: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/45.jpg)
45
Low Power Listening• Purpose
– Energy cost = RX + TX + Listen– Save energy
• How– Duty cycle the radio while ensuring reliable message
delivery– Periodically wake up, sample channel, and sleep
• The duty cycling receiver node performs short and periodic receive checks
• If the channel is checked every 100ms– The preamble must be at least 100 ms long for a node to
wake up, detect activity on the channel, receive the preamble, and then receive the message.
![Page 46: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/46.jpg)
46
802.15.4 Frame Format
• Page 36 of CC2420 Data Sheet
![Page 47: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/47.jpg)
http://www.mail-archive.com/[email protected]/msg07600.html
TinyOS Implementation of CSMA o CC2420 - CCA
• Hardware– CC2420 has CCA as a pin that can be sampled to
determine if another node is transmitting– See CC2420 Data Sheet – Figure 1 CC2420 Pinout
• Software– CC2420Transmit has the option to send the
message with or without CCA• See CC2420TransmitP.send();
![Page 48: Radio and Medium Access Control](https://reader036.vdocument.in/reader036/viewer/2022062500/568159fb550346895dc74758/html5/thumbnails/48.jpg)
https://www.millennium.berkeley.edu/pipermail/tinyos-help/2008-February/031061.html
TinyOS Implementation of CSMA of CC2420 - Ack
• Hardware Ack– If MDMCTRL0.AUTOACK of CC2420 is enabled
• Software Ack– SACK strobe in CC2420ReceiveP can be used to
set software ack