A transmission control scheme for media access in sensor networks
Summary (5 min read)
1. INTRODUCTION
- Sensor networks are an important emerging area of mobile computing that presents novel wireless networking issues because of their unusual application requirements, highly constrained resources and functionality, small packet size, and deep multihop dynamic topologies.
- Often, applications will arrange periodic rendezvous so that data can be communicated over many hops while allowing nodes to turn off their radios for lengthy periods.
- Much of the traffic moves through the network over several hops, perhaps with some intermediate processing, to points that are connected to a larger processing infrastructure.
- At the very least, fairness is at odds with both energy efficiency and high channel utilization.
- In short, the characteristics and goals of MAC in sensor networks differ strongly from conventional computer networks.
2. SENSOR NETWORK DESIGN POINT
- The authors study is grounded in the small, low-power networked sensor device shown in Figure 1 [7].
- The packet-level component is responsible for spooling incoming bytes and delivering the packet receive event.
- The other component is responsible for building the dynamic multihop network and routing traffic.
- Originating sensor packets are marked for the parent.
2.2 Metric for Evaluation
- The metrics for evaluation of a sensor network MAC protocol stress both fairness and energy efficiency.
- High aggregate bandwidth of packets only from nodes around the base station is not desirable.
- The energy consumed is the total energy that the network has invested in propagating data to the base station.
- The authors experiment is designed such that all nodes are in receive mode even during idle period.
- Therefore, the authors only account useful work as energy spent in channel listening and packet transmission under this metric.
2.3 Simulation Environment
- Given the difficulty in performing actual measurements in wireless networking, the authors first evaluate their system through simulation.
- Each UNIX process represents a networked sensor, and a master process is responsible for synchronizing them to perform bit time simulation.
- There is a simple radio propagation model in the simulation and the authors assume bit error rate to be zero, since their main focus is media access control.
- The simulator doesn’t simulate the actual hardware operating in the TinyOS environment.
- It preserves the event driven semantics and the dynamics of traffic flow shown in Figure 2.
4. DESIGN
- The authors discuss how media access control for sensor network should be done differently in this section.
- First, the authors explore what type of listening mechanism is appropriate for the case where all nodes can hear each other.
- Third, the authors present two mechanisms which they will study their effectiveness in the context of a multihop network.
- The first scheme is a conventional RTS/CTS contention control scheme, and the second one is their proposed adaptive transmission control scheme, and finally, a mechanism that all schemes can leverage off for avoiding some cases of hidden node problems in multihop network.
4.1 Listening Mechanism
- Carrier Sense Multiple Access (CSMA) and the Collision Detection (CD) scheme found in Ethernet are examples of listening mechanisms.
- Unfortunately, collision detection is not possible in wireless network technology without additional circuitry.
- Many protocols such as IEEE 802.11 require sensing the channel even during backoff.
- The highly synchronized nature of the traffic imposes a new criteria for CSMA.
- Detection of one common physical event will synchronize these nodes and lead them to send at the same time, which repeats periodically.
4.2 Backoff Mechanism
- The idea of backoff is to restrain a node from accessing the channel for a period of time and hopefully, the channel will become free after the backoff period.
- In the case of sensor networks where the traffic is a superposition of different periodic streams, backoff should not just restrain a node from sending for the backoff period.
4.3 Contention Based Mechanism
- Explicit contention control schemes, which are widely used in many MAC protocols, e.g., IEEE 802.11 [2] and MACAW [4], require the use of control packets, such as Request to Send (RTS) and Clear to Send (CTS).
- For sensor networks where packet size is small, they can constitute a large overhead.
- One advantage of a bidirectional multihop network is that acknowledgments are free when the receiving node (your parent in the multihop topology) routes the packet to its parent.
- This eliminates an explicit ACK control packet.
- Furthermore, if a node hears a CTS before any of its own transmission, it will defer transmission for one packet time to avoid corrupting the traffic.
4.4 Rate Control Mechanism
- The tension between originating traffic and route-thru traffic has a direct impact in achieving their fairness goal.
- Similarly, some kind of progressive signalling mechanism should exist for route-thru traffic, such that back pressure can propagate deep down into the network for those nodes to lower their rate of originating data.
- The adaptive rate control idea is very simple and can be explained with an analogy of metering traffic onto a freeway where the route-thru traffic is like traffic on the freeway and each node originating data is like cars trying to enter.
- The amount of computation for this adaptive scheme is small and within networked sensor’s computation capability.
- It requires a simple pseudo random number generator and a few addition and divide operations.
5. ANALYSIS OF CSMA SCHEMES
- The authors use both simulated and empirical measurements to explore the various ways of performing CSMA, and study their performance based on their energy efficiency metric, as well as traditional metrics, such as channel utilization and fairness.
- Traditional CSMA schemes have two basic design parameters: the carrier sense (or listening) mechanism and the backoff mechanism.
- The listening period can be random over a fixed interval or constant.
- Backoff time is random drawn from a fixed window, binary exponentially increasing window, or binary exponentially decreasing window.
- All nodes in the cell are able to hear each other, with node 0 being the base station.
5.1 Simulation Settings
- To make the simulation approximate their real platform, the packet size is set to 30 bytes, which is the actual packet size used in many networked sensor applications on their prototype.
- With 30 byte packets in Manchester Encoding, the 10kbps channel capacity can deliver at most 20.8 packet/s.
- The authors use a 16-bit CRC error detection mechanism to check for corrupted packets.
- The specific the values of all the necessary parameters for the CSMA schemes in Table 1 are given in Table 2.
5.2 Delivered Bandwidth under Simulation
- Since the channel capacity is 20.8 packet/s, the traffic load will exceed capacity when more than 4 nodes are sending.
- Their aggregate bandwidth is not very robust, as indicated by the two dips in the figure.
- The remaining schemes, with random delay or random listening intervals achieve slightly less bandwidth, but are more robust.
- The randomness introduced by the backoff mechanism may seem to be sufficient to avoid repeated collisions, however, without collision detection hardware greater attention must be paid to the listen phase.
- The performance is almost insensitive to backoff mechanism.
5.3 Energy Usage
- In examining the energy consumed in communication, the authors separate the portion spent in actually transmitting and receiving packets from that spent listening.
- The former is determined primarily by the traffic load; differences result from the happenstance of packets being dropped.
- The authors CSMA schemes with constant listen period are the most energy efficient, at approximately 10uJ/packet independent of network size.
- 4 Fairness Figure 7 and Figure 8 show the deviation of mean throughput per node among the three CSMA schemes and 802.11 as an indication of fairness.
- From the 802.11 data that are not shown in the figures, the authors found that nodes, which have an earlier transmission start time, end up capturing the channel and result in this unfairness.
5.5 Sensor Phase Shifting
- The half duplex nature of the networking stack makes CSMA vulnerable to the capturing effect.
- That is, during reception of neighboring node’s transmission, the network stack will not start any transmissions issued by the application.
- Instead, it will fail the transmission back to the application.
- If the two nodes remain in synchrony with one starting its.
6. ANALYSIS OF MULTIHOP SCENARIO
- This section extends their analysis to multihop networks where two essential challenges are present.
- First, if nodes near the base station originate too much traffic, little will bandwidth will be available for more distant nodes.
- The CSMA scheme developed for media access control is augmented with a transmission control protocol so that nodes adapt their data origination rate to give a fair share to downstream nodes and to match available upstream bandwidth.
- Like TCP, it adjusts its rate based on observed packet loss.
- For comparison, the base CSMA and 802.11 schemes are carried forward to multihop networks, as well.
6.1 Reference Topology
- Nodes are hidden from each other if they are not linked by an edge.
- Constructing this topology by physical placement of the nodes is challenging, especially with automatic route discovery, given the variability in cell shapes.
- Still there is significant connectivity and interference not present in the simulation.
- For the multihop scenario shown in Figure 14, the channel capacity of node 2 will determine the ideal transmission rate of the overall network.
6.2 Simulation Measurements
- The simulation runs with each node sending packets to the base station at rate of 4 packet/s with the same start time.
- This is an example of the unfairness resulting from schemes that fail to accommodate the collective behavior.
- “Gateway” nodes, which are close to the base station, dominate the channel and use up most of the channel capacity for delivering their own packets.
- A large β will impose a smaller penalty, especially for route-thru traffic, such that the aggregate bandwidth is higher and is more fair.
- They do so by heavily favoring nodes near the base station.
6.3 Empirical Measurements
- As discussed in Section 1, an ad hoc multihop network topology is dynamically determined by how node placement and physical environment influence radio propagation, and by the choice of route discovery algorithms.
- Cell boundaries are not sharp, so interference effects may overreach useful communication cells and complicate the problem.
- In term of fairness, all three settings of ARC is more fair than D CONST FIX alone.
- This is expected because node 1b’s α is much smaller than 1a’s α since 1b has to deliver traffic from its nine children.
- In fact, Figure 22 shows the yield of each node, which suggests that a lower beta achieves higher yield for each packet sent, and therefore, result in higher aggregate bandwidth.
7. CONCLUSION
- The paper has shown how the application scenario, resource limitation, and network traffic characteristics in sensor networks differ from conventional computer networks and explained why existing MAC protocols are not suitable in this regime.
- A comprehensive study has been performed in understanding the appropriate carrier sensing mechanism.
- The conclusion is that random delay should be introduced prior to any transmission, with backoff acting as a phase shift for the periodicity of the application.
- A new, simple adaptive rate control scheme for achieving the desired metrics in a multihop network has been proposed and compared with conventional contention based schemes.
- The authors adaptive scheme is extremely efficient in energy for low traffic situation which is the common case in sensor networks.
Did you find this useful? Give us your feedback
Citations
17,936 citations
Cites background or methods from "A transmission control scheme for m..."
...Constant listening times and adaptive rate control schemes can also help achieve energy efficiency in random access schemes for sensor networks [93]....
[...]
...The low-power sensor device described in [93], uses a single channel RF transceiver operating at 916 MHz....
[...]
...CSMA based medium access: A CSMA based MAC scheme for sensor networks is presented in [93]....
[...]
...Thus far, both fixed allocation and random access versions of medium access have been proposed [83,93]....
[...]
...As reported and based on simulations in [93], the constant listen periods are energy efficient and the introduction of random delay provides robustness against repeated collisions....
[...]
14,048 citations
Cites background or methods from "A transmission control scheme for m..."
...An adaptive transmission rate control (ARC) scheme that achieves medium access fairness by balancing the rates of originating and route-thru traffic is also discussed in [ 9 ]....
[...]
...MAC for Sensor Networks — Thus far, both fixed allocation and random access versions of medium access have been proposed [ 9 , 13]....
[...]
...CSMA-based [ 9 ] Contention-based random Application phase shift and pretransmit Constant listening time for access delay energy efficiency...
[...]
...As reported and based on simulations in [ 9 ], the constant listen periods are energy-efficient, and the introduction of random delay provides robustness against repeated collisions....
[...]
...CSMA-Based Medium Access — A carrier sense multiple access (CSMA)-based MAC scheme for sensor networks is presented in [ 9 ]....
[...]
5,354 citations
5,117 citations
Cites background from "A transmission control scheme for m..."
...Woo and Culler [14] examined different configurations of carrier sense multiple access (CSMA) and proposed an adaptive rate control mechanism, whose main goal is to achieve fair bandwidth allocation to all nodes in a multi-hop network....
[...]
...The medium access control is a broad research area, and many researchers have done research work in the new area of low power and wireless sensor networks [11], [12], [13], [14]....
[...]
4,889 citations
Cites background from "A transmission control scheme for m..."
...TinyOS [38] introduces random delays to break synchronization....
[...]
References
17,102 citations
"A transmission control scheme for m..." refers methods in this paper
...Other CSMA schemes rely on time synchronized slotted channel, such as Slotted ALOHA [ 11 ]....
[...]
5,620 citations
"A transmission control scheme for m..." refers methods in this paper
...While TCP’s congestion control is end-to-end over a network with many independent flows, our proposed adaptive rate control works collectively at every node in the network, since each node is both a router and a sender, and routing is done at the application level....
[...]
...Our adaptive rate control uses loss as collision signal to adjust transmission rate in a manner similar to the congestion control used in TCP [5, 6]....
[...]
3,648 citations
"A transmission control scheme for m..." refers background or methods in this paper
...TinyOS [7] is an event-based operating system for these devices that provides fine-grained interleaving of event processing and tasks from multiple system components....
[...]
...Our study is grounded in the small, low-power networked sensor device shown in Figure 1 [7]....
[...]
2,361 citations
"A transmission control scheme for m..." refers background in this paper
...First, we explore what type of listening mechanism is appropriate for the case where all nodes can hear each other....
[...]
2,000 citations
Related Papers (5)
Frequently Asked Questions (17)
Q2. What are the future works in "A transmission control scheme for media access in sensor networks" ?
These simulation results are further supported by real implementation on their tiny network sensor platform.
Q3. What is the only buffering in the system?
The only buffering in the system is a fixed number of small packet buffers at the application level, one of which is used for the asynchronous receive.
Q4. What is the main cause of the discrepancy between simulation and empirical measurements?
The reality of cell overlaps and interference in the multihop scenario is probably the main cause of the discrepancy between simulation and empirical measurements.
Q5. What is the effect of backoff on the fairness of the network?
Their results suggest that backoff with a fixed windowsize or binary exponential decrease in window size are effective in maintaining proportional fairness.
Q6. What is the ad hoc aspect of the protocol?
The ad hoc aspect of the protocol assumes peer-to-peer communications rather than many-to-one data propagation scenario as found in sensor network.
Q7. What are the common MAC protocols?
Explicit contention control schemes, which are widely used in many MAC protocols, e.g., IEEE 802.11 [2] and MACAW [4], require the use of control packets, such as Request to Send (RTS) and Clear to Send (CTS).
Q8. What is the power aware media access protocol?
PAMAS [13, 14] is a power aware media access protocol which powers off radio when not actively transmitting or receiving packets.
Q9. What makes it inappropriate for sensor networks?
The centralized TDMA protocol and the tight requirement of time synchronization between each node in the piconet make it inappropriate for sensor networks.
Q10. How does the proposed mechanism achieve fairness?
Simulation have shown that their proposed mechanism is effective in achieving fairness while maintaining good aggregate bandwidth with reasonable energy efficiency.
Q11. What is the protocol for a simple beacon-based discovery?
A simple beacon-based discovery protocol maintains a breadth-first spanning tree, such that each node knows a “parent node” closer to the base station.
Q12. What is the effect of backoff mechanism on proportional fairness?
The result suggests that backoff mechanism has an effect on proportional fairness, with binary exponential increasing backoff being the worst.
Q13. What is the goal of the proposed adaptive rate control scheme?
Their proposed adaptive rate control scheme builds upon this work, but their goal is to have media access control assist in achieving fair bandwidth delivery to the base station for nodes in a multihop network.
Q14. What is the reason why MACAW has suggested a scenario where multihop hidden node?
as discussed in Section 3, MACAW has suggested a scenario where multihop hidden node problem cannot be solved due to lack of synchronized information of knowing when is the contention period between a child node and its grandparent’s node.
Q15. How does the graph show the average rate of traffic delivered?
Figure 15 shows that nodes below first level of the tree achieve about 0.2 packet/s of delivered bandwidth, or about 25% of the ideal rate that saturates the bottleneck.
Q16. What is the easiest way to reduce energy and fill the channel?
The easiest way to reduce energy and fill the channel is to only take traffic from the nodes adjacent to the base station, but this hardly provides a valid sample of the overall sensor field.
Q17. What is the key requirement to share the channel fairly in an individual cell?
It is not sufficient to share the channel fairly in an individual cell, the authors would like to achieve a crude level of end-to-end fairness even in a deep and self-organized multihop networks, which may change dynamically and originate data at each intermediate node.