“fig... 733”“ ‘ «A .t ‘ 3mm». . flaw. Emma. 3% 1.. «Ma: . tfldi.is I. it‘i‘ :17 .m 4.3!. to . 4E..5..«.L.".w..m.«£ «a. IT . r 5»- a... yrnvxmil. If. ‘ In» A xx 3551...;2. 3 at... .0! W. .5 535;.» J... .u ‘0 ‘¥:‘!'. II. saluti; . z... ‘ .L- ‘I. $1.?J. :3 iv .65! 1w.— uminrov 34?...3.“ 11113315 ‘ LIBRARY Michigan State University .‘3 U 4:) This is to certify that the dissertation entitled SELF ORGANIZATION IN MEDIUM ACCESS CONTROL FOR WIRELESS AD HOC AND SENSOR NETWORKS presented by FAN YU has been accepted towards fulfillment of the requirements for the Ph.D. degree In Electrical Engineering 933M (km... Major Professor’ 5 Signature I o/ 2 9/o 3 Date MSU is an Affirmative Action/Equal Opportunity Employer PLACE IN RETURN BOX to remove this checkout from your record. TO AVOID FINES return on or before date due. MAY BE RECALLED with earlier due date if requested. DATE DUE DATE DUE DATE DUE 5/08 K:IProj/Acc&Pres/ClRC/DateDue.indd SELF ORGANIZATION IN MEDIUM ACCESS CONTROL FOR WIRELESS AD HOC AND SENSOR NETWORKS By Fan Yu A DISSERTATION Submitted to Michigan State University In partial fulfillment of the requirements For the degree of DOCTOR OF PHILOSOPHY Electrical Engineering 2008 ABSTRACT SELF ORGANIZATION IN MEDIUM ACCESS CONTROL FOR WIRELESS AD HOC AND SENSOR NETWORKS By Fan Yu The objective of this thesis is to investigate the role of protocol self organization at the Medium Access Control Layer in wireless ad hoc and sensor networks. Protocol self organization is defined as autonomous and self-calibrating communication state machines that can adjust their operating parameters and state machine logic as a reactive response to external operating environment such as network load, node crowding, topology changes due to mobility, energy depletion, infrastructure failure and communication errors. While the traditional wired networks continue to enjoy relatively stable operating environments, the emerging wireless and sensor networks suffer from the mentioned operating instabilities due to their ad hoc deployments, specialized applications and various resource constraints. The goal in this work is to utilize protocol reorganization as defined above in order to mitigate the effects of the mentioned instabilities. We propose a MAC self organization framework for both intra-MAC and inter-MAC as outlined below. For infra-MAC self organization, we develop an In-band Self-Organized Mfg; (ISOMAC), for wireless sensor networks with arbitrary mesh topologies. The specific problems the mechanism attempts to solve are arbitrary ad hoc deployment, energy limitation, and network dynamics. The novelty of the proposed framework lies in its in-band control mechanism. Both analytical and simulation models show that in addition to the reasonably fast reorganization convergence, the energy penalty of the in-band information is quite negligible. A cross-layer approach, Minimized Slot Misordered Routing (MSMR) with ISOMAC style MAC, is also developed. The self organizing TDMA MAC schedule is used as input to the routing protocol to generate routing paths. As for validation and extension of the ISOMAC framework, an application adaptation in vehicular wireless networks is investigated. An adapted ISOMAC, Vehicular Self-Organizing MAC (VeSOMAC), which is capable of inter-vehicle message delivery with short and deterministic delay bounds has been developed. Through n32 simulation experiments, the efficiency of self organizing abilities of VeSOMAC is demonstrated in the presence of fast topology variation in vehicular networks. Finally, we propose an inter-MAC self organization framework in the form of dynamic MAC protocol switching. The problem we address with this framework is to make a network adaptable with dynamic network loading conditions while providing acceptable user perceived performance. The key concept is that a network node can autonomously switch across different MAC layer protocols as a response to network traffic heterogeneity. Therefore, the reorganization here is accomplished across multiple protocols. Both theoretical and experimental analyses support that the dynamic MAC protocol switching logic enhances the network-wide throughput in the presence of traffic heterogeneity. Copyright by Fanifii 2008 To My Families For All Their Love and Support Acknowledgements I would like to thank my advisor Dr. Subir Biswas for supporting me through my Ph.D. study. His patient guidance allowed me to flourish during my research. I would also like to thank my committee Dr. Michael Shanblatt, Dr. Jian Ren and Dr. Philip McKinley for their precious suggestions and advices. Thanks must be given to my lab mates Tao Wu, Jayanthi Rao, Anthony Plummer, and Muhannad Quwaider for all of the helps, brainstorming and discussions. Last but not least, I would like give thanks to Changqing Chen, Juanita Dion and Lan Yang along with the rest of my friends for supporting me through this process. vi TABLE OF CONTENTS LIST OF TABLES X - LIST OF FIGURES XI CHAPTER 1 1 BACKGROUND 1 1.1. WIRELESS AD HOC NETWORKS I 1.2. WIRELESS SENSOR NETWORKS l 1.3. APPLICATIONS OF WIRELESS SENSOR NETWORKS 6 1.3.1 Military applications 6 1.3.2 Environmental Data Collection Applications 7 1.3.3 Health applications 8 1.3.4 Other Applications 9 CHAPTER 2 10 SELF ORGANIZING MEDIUM ACCESS CONTROL PROTOCOLS .............. 10 2.1 ROLE OF MEDIUM ACCESS CONTROL IN WIRELESS NETWORKS 10 2.2 CONCEPT OF MAC SELF ORGANIZATION 10 2.3 NEEDS FOR MAC SELF ORGANIZATION 11 2.4 RESEARCH ISSUES ADDRESSED IN THIS THESIS ...... 13 2.4.1 Design of Self Organizing MAC 13 2.4.2 Cross-layer Design 14 2.4.3 Application of ISOMAC Protocol for Vehicular Networks 16 2.4.4 MAC Protocol Switching 17 2.5 SUMMARY . I 9 CHAPTER 3 20 TOWARDS IN-BAND SELF ORGANIZATION IN ENERGY-EFFICIENT MAC PROTOCOLS FOR SENSOR NETWORKS 20 3.1 INTRODUCTION - 20 3.1.1 Motivation ........ 20 3.1.2 Related Work 20 3.1.3 Proposed ISOMAC Protocol ...... 24 3.2 NETWORK, TRAFFIC AND OPERATION MODEL 25 3.3 ISOMAC PROTOCOL DETAILS ............. 26 3.3.1 Frame and Slot Structure ................................. 26 3.3.2 Asynchronous ISOMAC (ISOMAC-A) ..... 28 3.3.3 Synchronous ISOMAC (ISOMAC-S) ........ 42 3.4 MODEL FOR FRAME SIZE DIMENSIONING AND ENERGY CONSUMPTION 43 vii 3.5 MULTl-SLOT ISOMAC FOR VARIABLE TRAFFIC ..... 3.6 PERFORMANCE . 47 49 49 3.6.1 Experimental Parameters 3.6.2 Protocol Convergence 50 3.6.3 Sensor Deployment 3.6.4 Spatial Channel Reuse ......... 3.6.5 Channel Errors 55 57 3.6.6 Energy Consumption 3.6.7 Effects of Clock Drift 62 3.6.8 Multi-Slot ISOMAC 3.7 SUMMARY AND CONCLUSIONS 65 CHAPTER4 CROSS-LAYER ROUTING PROTOCOLS IN THE PRESENCE OF MAC SELF ORGANIZATION 4.1 INTRODUCTION 67 67 67 4.1.1 Current MAC Self Organization Strategies in WSN 67 4.1.2 End-to-End Delay due to TDMA Slot Misordering 67 4.1.3 Related Work 70 4.1.4 Proposed Solution 71 4.2 MINIMIZED SLOT MISORDERD ROUTING (MSMR) 72 4.2.1 TDMA Allocation Model 72 4.2.2 Link Cost Formulation ..... 73 74 4.2.3 Baseline MSMR Route Computation 4.2.4 Balanced MSMR to Mitigate Packet Queuing 75 4.3 PERFORMANCE CHARACTERIZATION 78 4.3.1 Network and Data Model 78 4.3.2 Effects of MSMR on Delay ..... 79 4.3.3 Energy-delay 'II’adeo3.... 81 82 4.3.4 E3ects of Congestion and Packet Queuing 4.3.5 Balanced MSMR for Mitigating Congestion 83 4.4 SUMMARY AND CONCLUSIONS 85 CHAPTER 5 APPLICATION OF ISOMAC FOR VEHICLE-TO-VEHICLE COMMUNICATIONS FOR SAFETY AND DATA INTENSIVE APPLICATION S 5.1 INTRODUCTION .......................... 87 5.1.1 Application of ISOMAC... .............................................. 5.1.2 Background and Motivation ..... ............. 5.1.3 Related Work .............................................................. viii 5.1.4 VeSOMAC: Vehicular Adaptation of ISOMAC 92 5.2 VESOMAC PROTOCOL ADAPTATION DETAILS 95 5.2.1 Adapted Frame and Slot Structures 95 5.2.2 Adaptation of ISOMAC Protocol Logic for the proposed VeSOMAC .................... 96 5.3 PERFORMANCE EVALUATION 106 5.3.1 VeSOMAC Protocol Convergence 107 5.3.2 Highway Scenario Performance 111 5.3.3 Urban Traffic Intersection Scenario 126 5.3.4 Inter-vehicle Data 'h'ansfer Applications Performance 139 5.4 SUMMARY AND CONCLUSIONS 150 CHAPTER 6 152 DYNAMIC MAC PROTOCOL SWITCHING FOR PERFORMANCE ADAPTATION WITH TRAFFIC HETEROGENEITY 152 6.1 INTRODUCTION ..... 1 52 6.1 .1 Background 152 6.1.2 Related work ..... 153 6.1.3 Proposed Dynamic MAC Protocol Switching 155 6.2 PROTOCOLS SUPPORTING MAC SWITCHING 156 6.2.1 Generalized Concept 157 6.2.2 Specific Mechanisms for MAC Protocol Switching 158 6.2.3 Detailed Transmission Rules 162 6.3 MAC PROTOCOL SWITCHING LOGIC 166 6.3.1 Switching Criteria 166 6.3.2 Model for Switching Criteria 169 6.3.3 Mechanics of Protocol Switching 173 6.3.4 Response to Network Topology Variations 176 6.4 EXPERIMENTAL EVALUATION 177 6.4.1 Validation of Protocol Switching Decision Threshold .. 178 6.4.2 General Network Experiments 186 6.5 CONCLUSIONS AND ONGOING WORK ..... 193 CHAPTER 7 194 SUMMARY AND FUTURE WORK 194 7.] SUMMARY ....... 194 7.2 FUTURE WORK ............................................... 196 APPENDIX A 198 A MODEL FOR CONVERGENCE IN LINEAR NETWORKS 198 BIBLIOGRAPHY 202 ix LIST OF TABLES Table 3.1: Baseline system parameters in simulation ...................................... 49 Table 5.1: Baseline experimental parameters ............................................. 113 Table 5.2: Baseline experimental parameters for the UICW application simulation ..................................................................................... 133 Table 5.3: Time constant of protocols ..................................................... 150 Table 6.1: Baseline parameters of experiment ............................................ 178 LIST OF FIGURES Figure 1.1: Sensor Nodes Mote2, Mote2dot, Imote, TelosB, Cricket .................. 2 Figure 1.2: System architecture of clickable environment ............................... 8 Figure 1.3: Clickable environment sensor platform ....................................... 9 Figure 2.1: Pictorial summary of the investigated issues in this thesis proposal. . ..13 Figure 3.1 Slot allocation in ISOMAC .................................................... 27 Figure 3 .2: Concept of in-band header bitmap ........................................... 29 Figure 3.3: Slot selection feasibility ....................................................... 32 Figure 3.4: Iterative slot movement for convergence .................................... 35 Figure 3.5: State machine for ISOMAC ................................................... 40 Figure 3.6: Convergence characteristics for ISOMAC-A .............................. 50 Figure 3.7: Convergence in arbitrary mesh networks ................................... 53 Figure 3.8: Effects of sensor deployment pattern and spatial reuse in ISOMAC. . .55 Figure 3.9: Effects of channel error on protocol convergence ......................... 57 Figure 3.10: Stability and allocation recovery under varying packet error rates. . . .58 Figure 3.11: Energy performance of TDMA-W and ISOMAC ........................ 59 Figure 3.12: Effects of channel error on energy, clock drift on allocation stability..62 Figure 3.13: Effects of static and dynamic multi-slot allocation ...................... 64 Figure 4.1: Effects of TDMA on end-to-end delay ...................................... 68 Figure 4.2: Example MAC allocation and link cost formulation ...................... 73 Figure 4.3: MSMR operation with synchronized TDMA .............................. 74 Figure 4.4: pseudo-code of Balanced MSMR logic ..................................... 76 xi Figure 4.5: Effects of MSMR routing on delay .......................................... 79 Figure 4.6: Effects of density and hop count on PHO ................................... 82 Figure 4.7 : Packet queuing at higher sensor event rates ................................ 83 Figure 4.8: Increased allowable event rate with load balancing ....................... 84 Figure 5.1: Location aware MAC allocation by synchronous VeSOMAC ............ 93 Figure 5.2: Slot structure and steady allocation in adapted asynchronous VeSOMAC ..................................................................................... 95 Figure 5.3: Adaptation of ISOMAC feasible slot scenarios in example VeSOMAC..99 Figure 5.4: Iterative slot movements for allocation convergence ..................... 101 Figure 5.5: Adapted State machine for the VeSOMAC protocol with all constraints .................................................................................... 104 Figure 5.6: Pseudo code for the adapted VeSOMAC with all constraints ............ 105 Figure 5.7: VeNTSim: ITS application and network evaluation/planning tool. . .. 106 Figure 5.8: VeSOMAC convergence dynamics after a topology change ............ 108 Figure 5.9: VeSOMAC convergence latency for platoon mergers .................... 109 Figure 5.10: VeSOMAC convergence latency for intra-platoon vehicle passing... 110 Figure 5.11: Efficiency of VeSOMAC for reducing vehicle crashes in CCA application ................................................................................... 1 13 Figure 5.12: The effects of background non-safety traffic on avoiding vehicle crashes ....................................................................................... 114 Figure 5.13: Latency and crash statistics for CCA with VeSOMAC ................. 116 Figure 5.14: Latency and crash statistics for CCA with 802.11 ..................... 117 Figure 5.15: Effects of channel error on cooperative collision avoidance .......... 118 xii Figure 5.16: WCW message delivery latency across the entire platoon ............ 120 Figure 5.17: Distribution of cross-platoon delivery latency for 802.11 and VeSOMAC .................................................................................... 121 Figure 5.18: Message drop at different platoon locations ............................. 122 Figure 5.19: Effects of the ordering constraint on delay for VeSOMAC ............123 Figure 5.20: Impacts of TDMA slot reorganization during a UICW process ...... 125 Figure 5.21: Cooperative Collision Avoidance in an urban intersection scenario..127 Figure 5.22: Dynamics of a cross-street chain collision without UICW ............ 129 Figure 5.23: Leveraging UICW for reducing intersection vehicle crashes ......... 130 Figure 5.24: Pseudo-code for the WCW generation and interpretation in UICW..131 Figure 5.25: Vehicle crash performance with 802.11 and VeSOMAC ............... 134 Figure 5.26: Latency and crash statistics for CCA with VeSOMAC... .........136 Figure 5.27: Latency and crash statistics for UICW with 802.11 .................... 137 Figure 5.28: Message drop at different platoon locations ............................. 138 Figure 5.29: Crash performance with varying speed and vehicle count ............ 139 Figure 5.30: Throughput performance of non-safety data streams .................. 140 Figure 5.31: FTP duration with varying hop counts ................................... 142 Figure 5.32: TCP Performance: a) throughput, b) round trip time ................... 143 Figure 5.33: Dynamics of TCP : a) TCP-over-802.11, b) TCP-over-VeSOMAC. . ..144 Figure 5.34: Dynamics of TCP segment generation: a) 30 5-hop connections b) 10 1-hop connections .......................................................................... 145 Figure 5.35: FTP duration with varying vehicle switching rates ..................... 146 xiii Figure 5.36: TCP Dynamics with passing events: a) congestion window, b) segments generation ..................................................................................... 148 Figure 5.37: Dynamics of TCP throughput: a)TCP-over-802.ll, b) TCP-over-VeSOMAC ...................................................................... 149 Figure 5.38: Dynamics of TCP segment generation .................................... 150 Figure 6.1: MAC variations within networks ........................................... 158 Figure 6.2: Pseudo code for adapted CSMA/CA logic ................................ 160 Figure 6.3: Pseudo code for adapted TDMA logic ..................................... 161 Figure 6.4: Transmission fi'om TDMA node to CSMA/CA node .................... 162 Figure 6.5: Transmission from CSMA/CA node to TDMA node scenario 1 ....... 165 Figure 6.6: Transmission from CSMA/CA node to TDMA node scenario 2 ....... 165 Figure 6.7: Transmission from CSMA/CA node to TDMA node scenario 3 ....... 166 Figure 6.8: Pseudo code for protocol switching decision with ,1 and n. . . . . . . . .....170 Figure 6.9: Pseudo code for protocol switching decision with p and n. . . . . . . . .....172 Figure 6.10: Pseudo code of MAC protocol switching logic ......................... 175 Figure 6.11: Adapted network stack with dynamic MAC protocol switching logic ........................................................................................... 176 Figure 6.12: Protocol switching decision threshold on CSMA/CA .................. 179 Figure 6.13: Impacts of number of contenders on maximum service rate .......... 181 Figure 6.14: Impacts of protocol switching decision threshold on fully connected network ....................................................................................... 182 Figure 6.15: MAC protocol dynamics on fully connected network .................. 183 Figure 6.16: Impacts of switching decision threshold on arbitrary mesh network..l84 Figure 6.17: MAC protocol dynamics on arbitrary mesh network .................. 185 xiv Figure 6.18: Real-time throughput with varying data rate ............................ 186 Figure 6.19: MAC protocol dynamics with varying data rate ........................ 187 Figure 6.20: Real-time throughput with varying number of contenders ............ 188 Figure 6.21: MAC protocol dynamics with varying number of contenders ........ 189 Figure 6.22: Pictorial diagram of spatial traffic variation ............................. 190 Figure 6.23: Real-time throughput with varying spatial traffic profile .............. 191 Figure 6.24: MAC protocol dynamics with varying spatial traffic profile ......... 192 XV Chapter 1 Background 1.1. Wireless Ad Hoc Networks Wireless ad hoc networks are formed by wireless communication links among multiple communication devices. Nodes in an ad hoc network can forward data for other nodes, and hence the decision on whom and where the forwarding data should go are dynamically optimized based on the network connectivity and traflic load. It is unlike the traditional networks in which the task of data forwarding is commonly performed by designated routers with customized hardware and software. It is also different from managed wireless networks where a special node called access point manages the communication among other nodes. Minimal configuration and quick deployment are the two most important features of ad hoc networks. These features make these networks favorable for emergency and tactical situations such as battle-field surveillance and disaster recovery. The decentralized nature of most wireless ad hoc networks provides the adaptability of applications in circumstances in which a central entity is not available or cannot be relied on. And the scalability of the wireless ad hoc networks can be possibly improved in contrast with managed wireless networks, although the overall capacity is still limited, which has already been identified in [l] and [2] theoretically and practically . A 1.2. Wireless Sensor Networks Wireless sensor is a hardware device which is equipped with battery, sensor module, micro-processor, memory, and RF receiver/transmitter. The advances in micro-electro-mechanical system (MEMS) technology and digital electronics have made it possible to integrate a wireless sensor node with low-cost, low-power tiny hardware. For example, a Berkeley and Crossbow mote [3, 4] has an 8-bit Atmel AT90L88535 microprocessor as CPU running at 7.3728 MHz clock fi'equency, providing a data transmission rate of 19.2 Kbps by using the 916 MHz wireless frequency. Figure 1.1 shows some of the currently available sensor devices. Figure 1.1: Sensor Nodes Mote2, MoteZdot, Imote, TelosB, Cricket The concept of wireless sensor networks (W SN) is leveraged by these tiny sensor nodes, capable of sensing, processing, and communicating data. Many applications can be operated via WSN, such as environmental monitoring, target field imaging, intrusion detection, tactical surveillance, vehicle-tO-vehicle management, seismic structure response, and ecosystems monitoring. A sensor network usually is composed of a large number of sensor nodes that are densely deployed either within the phenomenon or very close to it in a stationary manner. Most of the time it is not necessary to engineer or predetermine the exact geographic positions of sensor nodes, which makes it possible to arbitrarily deploy in some inaccessible terrains or in disaster relief environments. Hence self-organization capability of individual sensor nodes is essential for algorithms and protocols used in sensor networks. Collaboration between the sensor nodes is another distinct feature. Due to the limited resources, each sensor node is expected to carry out few simple local processing and to transmit only the required and partially processed data to a “fusion” node through a low data rate flow. Node failure is also a problem that the sensor network protocols and algorithms have to face since sensor nodes are powered by battery and in most cases frequent replacements of batteries are not a possibility. Following is a list of wireless sensor network specific issues [5-8]: Application Specific: There are a large number of applications of the sensor networks such as environment data collection, public facility monitoring, vehicle tracking, battle-field surveillance and intrusion detection, which all benefit fiom combination of sensing, computing and communication technology. Different application scenarios diverge from each other (i.e., design requirements of a sensor network change with application), thus it is unlikely to find a general solution for all applications. For example, the challenging problem of low-latency precision tactical surveillance is different from that of a periodic weather monitoring task. Ad Hoc Deployment: Often times, there is no infrastructure in the regions where sensor nodes are deployed. Under unplanned wireless sensor network deployment, it is the individual sensor node’s responsibility to figure out the connectivity and data flow direction. This requires the sensor nodes to be self-organizing. Eneggz Constraint; Different from ad hoc networks, sensor nodes in WSN are all powered by battery and the replacement is usually difficult. Thus energy consumption is a primary consideration for wireless sensor network protocol and algorithm design. Since communication is significantly more expensive than computation [9], reducing energy dissipation used in communication becomes very important. Typically the non-essential energy consumptions are contributed from four sources. > Protocol overhead: besides valid data certain control messages have to be exchanged to access communication resources; > Message collision: unnecessary additional energy is wasted by retransmitting as well as receiving possible duplicate messages; > Overheating: sensor nodes spend energy in receiving messages for which they are not intended, because that message transmission usually is broadcast within WSN; > Idle listening: when there is no centralized scheduler to manage sequence of transmission, sensor nodes have to keep the wireless radio interface up (power on) for possible message receptions. Even when the sensor nodes do not transmit or receive any messages, the consumed energy can still be prevalent. Researches [9, 10] have shown that idle listening actually accounts for most of the energy expenditure at low traffic situations, which is quite common for most applications in WSN. In order to prolong network lifetime, different strategies should be incorporated at various network layers including hardware improvement at physical layer, energy efficient medium access control protocol, avoiding packet collision and idle listening, optimal routing path selection, and content filtering or error tolerance at application layer. Scalabilim' For certain applications, the number of sensor nodes in WSN can be very large, in some cases up to hundreds or thousands. Protocols and algorithms have to scale to these large numbers and deal with issues such as protocol overhead, limited bandwidth, and energy expenditure. Furthermore, it is not possible to build a global addressing scheme for the deployment of such large number of sensor nodes as the overhead of ID maintenance can become very high. Thus, traditional IP-based protocols can not be directly applied to WSN. Network Dvnthics: Although wireless sensor networks are often considered as stationary, some applications may require one or several powerful mobile nodes to achieve better performance [11, 12]. Beside mobile nodes, nodes addition and nodes failure (possibly due to battery drain) can also invoke network connectivity changes. The potential dynamics in the networks strengthens the need for self organization at the MAC and the routing layer. The MAC and routing protocols which can smoothly respond to the dynamics are preferable T rafic Patterns: Unlike communication in traditional ad hoc networks which is based mostly on point-tO-point transmission, sensor network mainly uses a multi-point to point communication paradigm and almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular base station. This, however, does not prevent the flow of data to be in other forms (e.g., multicast or peer to peer). The reason that all messages are sent to all the radio neighbors is because a single sensor node lack the global knowledge of the whole network. In addition, the traffic in the sensor networks can be continuous, event—driven, query—driven, or hybrid, based on specific applications. anIin of Service: Providing bounded message latency and high delivery ratio may be crucial in certain time-constraint applications such as intrusion detection and disaster warning. However, in some other applications like environmental monitoring it is enough to have only occasional packet delivery but with long network lifetime requirements. Especially when battery power is below normal operating threshold, quality of service has to be compromised for lifetime. Lo_cgtion Awareness: Location awareness in sensor nodes is important since data collection is normally based on the location of data and event generation. In a WSN often it is not feasrhle to use Global Positioning System (GPS) hardware in cost and energy constrained nodes. Methods based on triangulation [13], for example, allow sensor nodes to approximate their positions using radio strength from a few nodes with known coordinates. It is found in [13] that algorithms based on triangulation or multilateration can work quite well under conditions where only very few nodes know their positions a priori. 1.3. Applications of Wireless Sensor Networks Sensor networks are initially motivated by military applications such as intrusion detection, battle-field surveillance and enemy tracking. Recent research shows a rapid increase on the civilian applications like environment data collection, health monitoring, and disaster relief. 1.3.1 Military applications Battlefield Surveillance: Important terrains, routes, and paths can be monitored by deploying sensor nodes to the dedicated field. Sensor nodes can sense the activities or predefined critical events then send raw or post-processed information to the base station. Real-time situation requests can also be generated at the base station, and disseminated to requested areas. Tamet Hacking: Collaborative mobile sensing can cooperate with navigation system. For example, networked tracking of adversarial mobile targets using unmanned ground and airborne sensors is an emerging application for the militaries’ network-centric warfare capability. Target tracking is a prevalent military requirement across a wide spectrum of surveillance and reconnaissance scenarios including those in remote and urban battlefields, inside large buildings and public places such as airports, train stations, and inside underground tunnels. Forces and Equipment Monitoring: All forces and equipment can be attached with sensor nodes. Then the attached sensor nodes can periodically report the status to the commanders or leaders. The report can be sent to a single sink or multiple sinks and forward to upper command hierarchy if necessary. 1.3.2 Environmental Data Collection Applications Clickable Ecosvstem: This system is developed in the cooperation of Dr. Stuart Gage fi'om Department of Entomology and Dr. Subir Biswas from Department of Electrical and Computer Engineering at Michigan State University. Sensor nodes are placed at interested spots in the outdoor field. Bach sensor node automatically records the acoustic signals, weather data and images of monitoring spot. After the recording, acoustic signals are sent back to a data server in the laboratory via wireless through a single-hop or multi-hop network depending on locatiOn and availability. If individual sensor node is strong enough and there are not many obstacles in the sensing field, single-hop communication will be used to collect all sensing data. Otherwise, multi-hop communication will be used so that sensing field is covered without requiring a very powerful sink node. When an acoustic signal is received by the server, further analysis on biological indices are computed based on acoustic intensity in selected frequency bands. The final environmental acoustics are then stored in digital library, which can be accessed via regular internet network. Some sound tracks, sensing spot images and videos are available in [14]. Network National Repository ‘Clickable Environment’ Web Based Clients for Management . and Sensor Education and Research Public lnl I - [rzg ‘ 4 2'. P ing Existing Data such as ::/< . ,_,.; . .-. - . from National Weather I" “E" ‘"‘ "‘ :eomal Repository Server rvers Regional Data Aggregation ...;‘fl'm.’ Optional Field Data Satellite Broadband Networks Gateway Uplink‘, .-" “...“... Internet. A093113101” Node (GN)\ 3318"“ "N. W0" l ‘-—* Field Habitat Server “‘ ‘Clustef .l'£:"'.12':'..' 3" ,..- "1' Leader (CL) Regional Field Sensor Network: Tier-2 Lower Sensing Resolution: e.g. 30m - 500m Dynamic ' ' 0|- with Hierarchical sensors transmit} ll 3. L/ l. (l. h. Resolution: e.g. 1m - 30m Trer -1 nodes with sengors Figure 1.2: System architecture of clickable environment [14] 1.3.3 Health applications Tracking and Monitoring Doctors and Pgtients inside a Hospital: A small and light sensor can be attached to each patient in the hospital. The sensor is able to monitor the heart rate, blood pressure, body temperature, and to locate the patient. Sensor data is sent to a central monitoring center and processed so that all patients can get immediate response if any reading is abnormal. And sensor nodes can be attached to doctors to locate them for potential emergencies. .Waterproof Case Stargate Single Board Computer ' .. . . ’ Solar Panel Interface . Wrreless Commun Habitat \ _. . Card: IEEE is.» . 802.11b (blow) " . Micro- ‘ phone Local Flash . 12V Deep Cycle Battery Figure 1.3: Clickable environment sensor platform [14] 1.3.4 Other Applications Home Automation: Smart sensor nodes can be embedded in all home electronics, such as vacuum cleaners, micro-wave ovens, refrigerators, washing machines, TVs, air conditioners, lamps, and computers etc. All the electronics can interact with each other or with external network via internet or cellular network. End users are also able to control or manage home devices locally and remotely. Vehicle Tracking and Detection: Sensors with GPS function can be built into cars. Location information of cars are recorded and sent back to base station for example city traffic management center. Individual car is tracked down and real-time traffic information can be derived from fusing all cars’ information. Chapter 2 Self Organizing Medium Access Control Protocols 2.1 Role of Medium Access Control in Wireless Networks In wireless networks, packet collision is a common challenge [15-19]. Packet collisions usually result from two or more nodes sending data at the same time over the same transmission medium or channel. Medium Access Control (MAC) protocols have been developed to aid nodes to determine as to which node gets to use the channel when competitions for the channel exist. In the literature, this problem is known as multi-access channel allocation problem of the MAC layer, which belongs to a sub-layer of the data link layer in the seven-layer Open System Interconnect (OSI) network model. The addressing and channel access control mechanisms proposed in the literature make it possible for several nodes to communicate within a network. 2.2 Concept of MAC Self Organization Generally speaking, protocol self organization means that elements in a protocol interact with each other to dynamically achieve a global protocol function or behavior [20, 21]. According to the definition above, the services provided by MAC self organization should be “self” adapted to environmental changes. More specifically, the concept of self organization includes the following four aspects. , (i) The protocol itself is unsupervised and distributed. (ii) Protocol parameters can be dynamically changed by adaptation of network variables. The purpose of dynamic changes is to constantly improve and 10 maintain better protocol performance. (iii) Protocol state machine can be also changed when changing just the protocol parameters may not be enough to cope with the changes in network environment. (iv) A node can even change its operatingprotocol when the protocol state machine and parameter changes within a single protocol may not be enough to cope with the changes in network environment. 2.3 Needs for MAC Self Organization MAC layer has a direct bearing on how data can be exchanged between two nodes along a routing path in the network. Because of the unique features we described in chapter 1, such as constraints on computational ability, storage and energy resources, MAC protocols in wireless Ad H00 and sensor networks are quite different from traditional networks. MAC self organization addresses those constraints in the following ways: (1] Ad hoc deployment: In Ad Hoc and sensor networks nodes are deployed in an unplanned manner and with typically no centralized entity. The MAC protocol itself at each node has to find out the connectivity and neighborhood information so that all the nodes can access the shared medium or channel to create a basic communication infrastructure. The MAC self organization addresses this requirement because of its autonomous operation feature. And if any unplanned redeployment happens, it could adjust to the dynamics accordingly. (2) Enemy limitation: As mentioned before, energy is a scarce resource in wireless ll sensor networks. In addition to building a basic communication link, MAC protocol in wireless sensor network has to be energy efficient by providing a smart sleep/wake-up mechanism so that it ensures sensor nodes to sleep as long as possible to save energy consumption and to extend network lifetime. The smart sleep/wake-up schedule has to be obtained in a distributed manner, and the changes caused by energy change need to be addressed. MAC self organization is suitable for these operations due to its distributed manner and dynamic adjustment features. (3) Network dynamics: There are three major aspects of network dynamics. They are topology dynamics, load/name dynamics, and communication dynamics. > Topology dynamics often include node failures, link failures, and node mobility. Sensor nodes are more prone to failure in contrast to traditional networks due to limited resources. Thus new sensor nodes can be deployed for failure recovery or redundancy. Also a certain number of nodes in a network can be mobile for enhancing the network operations, and any node mobility adds to the network dynamics. > Load dynamics is usually spatial and temporal. It is typically introduced by non-uniform deployment or emergence of certain events. > Communication dynamics can be generated by outside radio interference, radio medium fluctuation, and radio strength change due to fading. The advantage of MAC self organization is that it copes with these various dynamics by changing protocol parameters, state machine, or even the protocol itself, as outlined in Section 2.2. 12 2.4 Research Issues Addressed in this Thesis A number of protocol self organization issues related to the MAC layer in wireless ad hoc and sensor networks is investigated in this dissertation. A summary of the investigated issues and their relations are outlined in Figure 2.1. Introduction and MAC Self Organization Overview (Chapter 1 8r 2) Inter-MAC Self Organization Multi-MAC Organization MAC Protocol Switching (Chapter 6) Core Self Organizing tom-layer Application ISOMAC (Chapter 3) VeSOMAC Extension for Vehicular Networks (Chapter 5) Linear Network Convergence Model (Appendix A) Figure 2.1: Pictorial summary of the investigated issues in this thesis proposal 2.4.1 Design of Self Organizing MAC 2.4.1.1 Motivation and Related Work The sensor nodes are often critically constrained by their operating energy availability. This makes energy management as one of the key challenges in designing such systems. As a result, wireless embedded networking is often perceived as a design problem to deal with energy-bandwidth and energy-delay tradeoff, as Opposed to the classical delay-bandwidth tradeoff in conventional networking systems. 13 The protocol Sensor-MAC (SMAC) [9] attempted to introduce interface wake-sleep cycles in the presence of random channel access. T-MAC [22] enhances the performance of SMAC by making the wake periods adaptive. Both of them suffer from the inherent energy inefficiency of contention based protocols. In TRAMA [23] nodes maintain a network-wide common frame which is organized into alternating contention-based “random access” and contention-free TDMA allocation “scheduled access” regions. Control packets of TRAMA are still susceptible to collisions. TDMA-W [24] is another distributed out-of-band TDMA protocol. But the adaptation of network dynamics is not handled well in TDMA-W. 2.4.1.2 Proposed Work We wanted to address the intra-MAC self organization problems with energy limitation, network dynamics, and ad hoc deployment from the list in Section 2.2. Thus an In-band Self-Organized MAC (ISOMAC) protocol is proposed. ISOMAC is a distributed TDMA typed MAC protocol. By avoiding explicit timing information exchange, ISOMAC can work without network-wide time synchronization which can be prohibitive for severely cost-constrained sensor nodes. Efficient energy expenditure is achieved by employing a partial node wake-up and header-only transmission strategy based on the instantaneous nodal data rate. The slot-cluster effect, caused by in-band bitmap constraints, enables ISOMAC to offer better spatial channel reuse compared to traditional distributed TDMA protocols. The detailed ISOMAC protocol will be introduced in chapter 3. 2.4.2 Cross-layer Design 14 In traditional network design, the seven-layer open systems interconnect (081) [25] model divides the overall networking service into seven layers and defines a hierarchy to be provided at each layer. The central idea of cross-layer design is to Optimize the control and exchange of information over two or more layers to achieve significant performance improvements by exploiting the interactions between various protocol layers. There are two primary reasons that favor the cross-layer design. To begin with, wireless links create new problems for layered protocol design. One classic example is TCP which considers packet error as an indication of congestion. Additionally, cross-layer design could provide more opportunistic communication than single layer design [26-33]. In [28] the authors divide cross-layer design into four categories. (1) Creation of new interfaces: The created new interface will be used to share information between layers. This includes sharing lower layer(s) information upward towards higher layer(s), higher layer(s) providing parameters downward towards lower layer(s), and an iterative loop between two layers. (2) Merging of adjacent layers: This manifestation provides service from a new super layer that is the union of constituent layers. (3) Design coupling without new interfaces: Two or more layers can be coupled together without creating extra interfaces for the purpose of information sharing. (4) Vertical calibration across layers: The performance at high layer can be a function of the parameters at all layers below it. 2.4.2.1 Motivation and Related Work 15 While solving the energy problem at the MAC layer, the TDMA mechanism can give rise to increased end-to-end routing layer delay. This can happen when the TDMA slots of sensor nodes on a route are not time-ordered in the same sequence as the nodes appearing on the route. The problem is that if we have a TDMA type medium access control for delay sensitive and event based sensor network application, what is the best routing scheme. DMAC [34] tries to allocate MAC communication sequence based on routing path along collecting tree in the sensor networks. However, DMAC only assumes unidirectional data flow towards the root in the presence of preset routes. In [3 5], the protocol proposes to use a link scheduling algorithm to find the minimum-delay schedule for given slot lengths for all the links. The ignorance of congestion at higher level nodes near sink is the primary disadvantage. 2.4.2.2 Proposed Work We take a different approach to address the delay problem by computing minimum delay routes based on a given TDMA allocation. We try to find the delay-optimized routing based on pre-set TDMA slot allocation. Our proposed Minimized Slot Misordered Routing (MSMR) addresses the problem of end-to-end delay mitigation in sensor network with TDMA MAC. Delay reduction in MSMR is accomplished by computing least cost routes with a link cost formulation based on the degree of misordering of the TDMA slots of nodes across a link. Chapter 4 describes the details of MSMR. 2.4.3 Application of ISOMAC Protocol for Vehicular Networks 16 2.4.3.1 Motivation and Related Work MAC self organization is important not only in sensor applications but also in other applications such as the ad hoc vehicular networks. Different features of the application impose different challenges on MAC self organization. Unlike energy being the primary issue in sensor networks, message (especially safety related) latency and delivery ratio become the first priority in vehicular networks. A number of variations of CSMA/CA and 802.11 have been implemented in [36-38]. The unbounded delay caused by the fundamental random access mechanism is an issue for such protocols. The protocols in [39, 40] propose schedule-based TDMA mechanisms, all with a large upfront reconfiguration delays. The protocol LCA [41] proposes a scheduled TDMA scheduling mapping with vehicles’ instantaneous geographical location. But the problem of complete pre-mapping of geographical locations and dimensioning of optimal cell size are non-trivial. 2.4.3.2 Proposed Work A multi-hop delivery delay minimized MAC self organization protocol for the vehicular networks has been adapted from ISOMAC in chapter 5. The adaptation addresses the problems of bounded delivery latency and small reconfiguration delay. The adapted Vehicular Self-Organizing MAC (VeSOMAC) is designed to be vehicle location and movement aware so that the MAC TDMA slots in a vehicle platoon can be time ordered based on the vehicles’ relative locations. Chapter 5 provides detailed information of VeSOMA C. 2.4.4 MAC Protocol Switching 17 2.4.4.1 Motivation and Related Work Previously we look into the MAC self organization problem in the context of intra-MAC operations. Different types of MAC protocols have merits in varying network scenarios. For instances contention based protocols are generally suitable for bursty and low congestion scenarios, whereas schedule based protocols overwhelm in multiple concurrent traffic scenarios. Multiple different MAC protocols could coexist within the same network, especially a network with varying traffic dynamics. Instead of MAC self organization problem in infra-MAC protocol, coexistence of multiple MAC protocols raises new challenges for inter-MAC protocols. Protocols like Funneling-MAC [42] try to deal with non-uniform network dynamics by a single hybrid MAC protocol. Although problems are relieved to some extent, these solutions are only suitable for applications with special traffic characteristics or assumptions with powerful nodes’ coordination. The traffic heterogeneity is not fully explored to address the problem of maximizing the network-wide throughput. 2.4.4.2 Proposed Work We propose to handle the MAC self organization challenges from coexistence of multiple MAC protocol in network by the concept of “MAC switching”. This is used to deal with the ad hoe deployment and network dynamics problems. Instead of trying to give a generic solution, we elaborate the MAC switching concept between two candidate MAC protocols, TDMA and CSMA/CA. The modifications of 18 transmission rules in both protocols and the general switching logic have been developed. Chapter 6 provides details. 2.5 Summary We first describe the role of Medium Access Control in wireless networks. The concept of the MAC self organization is then elaborated. Inspired from three distinct constraints of the WSN we further discuss the needs of the MAC self organization. The development of the topics addressed in this thesis is finally presented. A brief motivation and related work, followed by a summary of the proposed work, are provided for each of the four major topics in this thesis. l9 Chapter 3 Towards In-Band Self Organization in Energy-Efficient MAC Protocols for Sensor Networks 3.1 Introduction 3.1.1 Motivation Because of their low cost, tiny form factor and remote unattended deployments, embedded sensor nodes are often critically constrained by their operating energy availability. This makes energy management one of the key challenges in designing such systems. As a result, embedded wireless networking in WSN is perceived as a design problem to deal with energy-bandwidth and energy-delay tradeofi‘, as opposed to the classical delay-bandwidth tradeofl' in conventional networking systems. While energy syntaxes are being developed by the research community at all the protocol layers, energy-eflicient Medium Access Control (MAC) remains a key design challenge. In this chapter, we present an intra-MAC self organization mechanism to mainly address the problems of energy, ad hoc deployment, and network dynamics. 3.1.2 Related Work A common design approach for the existing energy—aware sensor MAC protocols [9, 22-24, 34, 43, 44] is to reduce idle energy consumption [45] by introducing network interface sleep. This is typically achieved by introducing a notion of sleep-awake cycle, in which a node sends and receives data during the wake periods, and conserves energy by switching off its interface during the sleep periods. The 20 smaller the wake-sleep duty cycle, the higher the savings. The goal is to operate in the smallest possible duty cycle while being able to support the application traffic loading. For sensor MAC protocols, it is often necessary to trade MAC delivery delay, effective throughput and node fairness [46] for energy efficiency. Sleep-wake cycles are typically not feasible for traditional contention-based protocols such as ALOHA [47], CSMA [48], and 802.11 (DCF mode) [49]. This is primarily because these random access protocols are fimdamentally asynchronous in not having timing coordination between the senders and their receivers. As a result, a node is needed to be always awake for possible packet receptions from its neighbors. This results in the energy inefficiency for random access protocols. In a hybrid design, the protocol Sensor-MAC (SMAC) [9] attempts to introduce wake-sleep cycles in the presence of random channel access. During the wake periods nodes execute an 802.11-like contention based MAC protocol, and during the sleep periods all nodes turn their interfaces ofi‘. Sensor nodes form virtual clusters so that all nodes within the same virtual cluster maintain the same wake-sleep schedule. By decreasing the wake-sleep duty cycle, SMAC can trade latency and effective channel capacity for energy efficiency. The main concern with SMAC is that since its basic medium access mechanism is contention-based, the protocol is still susceptible to collisions and its resulting energy inefficiency during waking periods. Also, the protocol assumes static traffic loading with predetermined duty cycles. While the latter issue is addressed in the protocol T-MAC [22] by making the waking periods adaptive, it still suffers from the inherent energy 21 inefficiency of contention based protocols, packet collisions. This inefficiency can be avoided in Time Division Multiple Access (T DMA) based protocols. In TDMA protocols such as HiperLan-II [50], since all transmissions within a MAC frame are pre-scheduled, it is possible for a node to sleep when it is not expected to transmit or receive packets. Although it solves the energy problem, an implementation issue with HiperLan-H of its dependency on a centralized base station for TDMA scheduling still exists. For ad hoc deployed sensor networks, such centralized infrastructure is usually not feasible, and thus the design goal should be to develop a TDMA style protocol with distributed MAC slot scheduling algorithms. The protocol TRAMA [23] implements such a distributed TDMA allocation among time synchronized nodes. In TRAMA, nodes maintain a network wide common frame which is organized into alternating contention-based “random access” and contention-free “scheduled access” regions. Data transmission is performed in “scheduled access” slots and neighbor information exchange is performed in “random access” slots. After the neighbor information (up to two-hops) is collected during the contention-based phase, the nodes execute a distributed election method to decide the transmission schedules within the local neighborhood. TRAMA clearly achieves the goal of distributed TDMA for improved energy efficiency without a centralized coordinating base station. The following operational shortcomings of TRAMA have been identified. First, global TDMA frames require network wide time synchronization, which can be a severely restrictive process [51, 22 52] for cost-constrained sensor nodes, especially in very large networks with potentially thousands of nodes. Limited energy, bandwidth, hardware and unstable links in multi-hop sensor networks with unpredictable delay characteristics make network wide time synchronization particularly difficult. Second, although the data communication in TRAMA is contention-free, the control information exchange is still susceptible to collisions which can limit the energy-gain of the protocol to some extent. Finally, a new node can join the network only during the random access period. Thus, for keeping the node join-latency small, the random-scheduled duty cycle will have to be appropriately dimensioned based on the rate of change in network topology. In spite of these operational difficulties, TRAMA provides a useful TDMA framework with distributed MAC scheduling. TDMA-W [24] is another distributed MAC scheduling protocol without using contention based control like TRAMA. Nodes in TDMA-W send control packets during scheduled data slots, and that is how the neighbors’ allocation information is disseminated. Based on its neighbors’ allocation information, a node is able to select a collision-free transmission slot, which will be used for subsequent data as well as control packet transmissions. Although TDMA-W has a steady state allocation target very similar to our proposed ISOMA C, the former has the following shortcomings. First, TDMA-W, as presented in [24], requires absolute slot identifications to be exchanged through the control packets. Unlike ISOMA C, that makes TDMA-W dependent on global framing and time synchronization. Second, TDMA-W incurs a high energy cost as 23 follows. In each frame, a node must remain awake during its wake-up slot even if it is not transmitting or receiving during that frame. This implies that a node must expend one full data slot worth of energy in each frame irrespective of its communication activities. Third, in TDMA-W there is no syntax for a node to inform its neighbors about its own “wake-up slot”. In the absence of this information, although the protocol will work when all network nodes are added/activated simultaneously, it will not work in more realistic incremental node addition scenarios. Whereas, ISOMAC addresses the shortcomings of TDMA-W. 3.1.3 Proposed ISOMAC Protocol We present a distributed TDMA scheduling protocol ISOMAC (In-band Self-Qrganized MAC), which achieves similar goals as in TRAMA, but without its restrictions stated above. The key idea in ISOMAC is to use an in-band control mechanism for MAC self-organization. Instead of sending explicit control packets as in TRAMA, nodes use a bitmap vector in data packet headers for exchanging slot occupancy information among the neighbors. In the header of each outgoing packet, the transmitting node inserts a bitmap vector which represents the relative TDMA slot timing of all its l—hop neighbors with respect to the transmitting node’s own slot location. As a newly joined node receives data packets from its neighbors, it gradually learns about the TDMA slot locations of all its neighbors and the neighbors’ neighbors (i.e. 2-hop neighbors). Based on this allocation information of up to two-hop neighbors, the new node is able to select a collision-free transmission slot. In ISOMAC, this is how an in-band control mechanism is used to avoid the 24 contention based out-of-band control, as used in TRAMA. In addition to its energy efficiency, the primary features of ISOMAC are as follows. 1. MAC self-organization is achieved using a novel in-band technique. Since there is no contention based operation in the protocol, it is virtually collision free at steady states. 2. ISOMAC does not depend on network time synchronization. Although it can be implemented with time synchronization, experimental results indicate that the performance improvement due to synchronization is quite modest. 3. The protocol is fair. A guaranteed data rate is allocated to each node, which is allowed to use a part or the entire allocated rate depending on its individual traffic load 4. ISOMAC is insensitive to moderate channel errors. This is notable since in-band protocols are generally known to perform poorly in erroneous channel conditions. 5. ISOMA C’s in-band bitmap vector design intrinsically provides higher spatial reuse compared to other distributed TDMA protocols. 6. In ISOMAC, information about the location of wake-up slot is implicit and therefore, unlike in TDMA-W, it can handle both simultaneous and incremental node additions. 3.2 N etwork, Traffic and Operation Model ISOMAC is designed for arbitrary sensor mesh topology using a single channel 25 with spatial reuse. Nodes are static and the links are bidirectional. Upon deployment, a node executes the in-band ISOMAC protocol for choosing a collision flee transmission slot. Nodes automatically adjust their allocation to accommodate topology changes caused by node arrivals and departures. ISOMAC is routing protocol agnostic and it can support point-to-point, point-to-multipoint [53] and multipoint-to-point sensor [54] traffic. In ISOMAC, a node is allowed to transmit data at any rate up to X. which is the maximum alloc ’ allowable rate per node. A split-slot interface sleep technique is introduced to ensure that a node can adjust its sleep-wake duty cycle to optimize its energy expenditure according to its own and the immediate neighbors’ data transmission rates. The notion of flame in ISOMAC is completely local to individual nodes (same size for all nodes). Timing information exchange between nodes is relative, thus the protocol can work without network time synchronization. If the nodes, however, are time synchronized, ISOMAC can be implemented with global flame structures. In either case, all sensor nodes in the network are required to run at the same clock flequency, with limited degree of allowable clock drifts. 3.3 ISOMAC Protocol Details 3.3.1 Frame and Slot Structure Packets are assumed to be of constant length and correspond to the Tx-slotl duration I. As shown in Figure 3.1, each Tx-slot is split into a header sub-slot (T h eader) and a relatively much larger data sub-slot (T data ). A flame is of duration l . . . . . . From tins pornt, unless otherwrse specrfied, the term slot Will be used to refer to a transmisszon slot. 26 T flame , and it defines the minimum periodicity of transmission slots flom any node. Therefore, the allocated rate to a node can be written as lalloc = 1/ T fi'ame packets per unit time. Although one Tx-slot is periodically allocated to each node during a flame, a node can choose to skip transmissions in the absence of data packets in its transmission buffer. Such data skipping are marked as “Header-only Tx” in Figure 3.1. Ba De Ea a) Linear sensor topology Time a H er Data m; T?“ A:lj Interrupt sub-slot Tx-Slot B 21:] Data and header Tx E :ZL 11:] H—J \ Y J Headcr'only TX E’s flame b) Steady state allocation for ISOMAC-A Figure 3.1 Slot allocation in ISOMAC For each node, immediately after its transmission slot, there is an interrupt sub-slot. This receive-mode sub-slot can overlap with any of this node’s l-hop neighbors’ transmission slots. As a result, the interrupt sub-slots do not affect the available data rate, as it is intended only for receiving. Also, this sub-slot is typically much smaller than the data sub-slot duration. In our design, Tint errupt has been set to be equal to the header duration T h ea der' The purpose of this sub-slot will be 27 explained later when the protocol details are elaborated. Note that all the defined sub-slot types include necessary guard times for modern preambles and Tx-Rx switch over latencies, when applicable. 3.3.2 Asynchronous ISOMAC (ISOMA C-A) 3.3.2.1 Steady State Allocation and Transmission Slot allocation in ISOMAC needs to satisfy the following timing constraint. liming Constraint: At steady state, no two one-hop or two-hop neighbors ' transmission slots can completely or partially overlap. Overlaps between one-hop neighbors cause direct collisions and between two-hop neighbors cause hidden collisions [55]. A valid allocation schedule for nodes A, B, D and E in the linear network topology of Figure 3.1:a, is shown in Figure 3.1:b. Since the shown allocation is for the asynchronous version of ISOAM C, nodes are depicted to maintain their own flame boundaries. Note that except the node pair (A, E) all other nodes are within up to two-hop distance of each other. That is why in the allocation schedule, all nodes have completely non-overlapping Tx-slots except those of nodes A and E. Such overlapping slots provide spatial channel reuse in ISOMAC. Although in each flame a full Tx-slot is allocated to each node, it may transmit both header and data, or only header. In other words, even if there is no data to be sent, a header is always transmitted in each flame flom each node. Packet headers are used by ISOM4C protocol for sending allocation information using an in-band bitmap vector as explained below. 28 3.3.2.2 In-band Header Bitmap Relative timing information about Tx-slot allocation is exchanged using a Bitmap Vector (BV) in each packet header. Bits in the EV from a node represent how its one-hop neighbors are occupying Tx-slots in the immediate temporal vicinity of the node’s own Tx-slot. The concept is explained in Figure 3.2, in which the top segment illustrates how a node P is allocated a Tx-slot within its own TDMA flame. The middle row depicts the Tx-slots occupied by all of P’s one-hop neighbors. Note that although these neighbors’ slots are shown in the timing context of P’s flame, all four neighbors maintain their own frames which are asynchronous to each other. The bottom row shows the bitmap vector that node P inserts in the header of each of its outgoing data packets. Middle of the bitmap represents the timing of P’s own slot. In this example, the bitmap vector is 4-bit long and each bit represents the occupancy status of two slots in the vicinity of P’s own Tx-slot For example, the ‘ l ’ in “+1” location indicates that two slots immediately following P’s slot are already fully or partially occupied. Similarly, a ‘0’ in the “-1” location indicates that node P perceives both the slots before its own slot to be flee. Tx Slot allocated th (Header + data) <——— P’s Frame HIHWZHH I- »? Eb iT: All Tx—slots allocated to P’s l-hop neighbors Interrupt sub-slot l P’sBitmapVector IIIOII rlj (LengthB=4) -2 -1|+1 +2 ’ Figure 3.2: Concept of in-band header bitmap 29 The bitmap vector length is typically much smaller than the total number of Tx-slots in a flame, and therefore it can convey the occupancy information only about limited number Tx-slots around the temporal vicinity of the transmitting node’s own slot. In the example in Figure 3.2, the frame size is 12, whereas the bitmap vector length is only 4, which can convey the occupancy information about 8 slots. Observe that with a bitmap size B = 4, P is unable to represent the occupancy information about one of its neighbors’ (the one in extreme left) slot. Using this header bitmap, a transmitting node continually informs all its l-hop neighbors about Tx-slots that are occupied by the transmitting node’s l-hop neighbors. By listening to the bitmaps in all received packets, a node can figure out the relative slot locations of all its l-hop and 2-hop neighbors. In turn, with this information, the receiver node can choose a collision-flee Tx-slot which is non-overlapping with the slots of its l-hop and the 2-hop neighbors. The primary advantage here is that all timing information exchanged is relative to the slot location of the transmitting node. This relative timing allows ISOMAC to be implemented with or without network time synchronization. Though in the asynchronous version, the bitmap efficiency is reduced by the overhead that one bit here represents the occupancy information of two slots instead of one. This is because a neighbor’s Tx-slot can partially occupy two slots in the absence of TDMA flame synchronization. In the worst case, this effect may actually render half of the system capacity unusable. In the synchronous case, however, this overhead does not exist. This indicates that in the asynchronous ISOMAC-A, the capacity efficiency is 30 traded for more distributed deployments without the need for time synchronization across the network. Since the bitmap length is kept smaller than the flame slot count, the ISOMAC allocation needs to satisfy the following Bitmap Constraint: If two nodes i and j are one-hop neighbors then i is chosen slot should be able to be represented within the bitmap vector of j. The same is applicable for node jis slot. Since each bit corresponds to two slots, this constraint means that the slots of nodes i and j can not be more than B slots apart, where B is the bitmap length. For a node, the bitmap constraint is satisfied when it is able to find a ‘1’ corresponding to its own time slot in the bitmaps of Q its l-hop neighbors. In the allocation shown in Figure 3.2, the separation between P’s Tx-slot and one of its neighbors’ Tx-slots (extreme left) is more than B (which is 4) slots. This indicates that the shown allocation does not satisfy the bitmap constraint, and therefore is not stable. The bitmap constraint is particularly important because a large B incurs higher capacity overhead, and therefore the goal of the protocol would be to use the smallest possible B, which will allow the protocol to converge within acceptable time duration. 3.3.2.3 Transmission Slot Feasibility For a new node that is entering the network, a feasible transmission slot is one that satisfies the timing and the bitmap constraints as defined in Sections 3.3.2.1 and 3.3.2.2. Feasible Slots: From the bitmap standpoint, a feasible slot should be within a time 31 region represented by shared ‘019 in the bitmaps transmitted by all the neighbors of the new node. Consider the topology in Figure 3.3, in which a new node R joins in between two unconnected nodes P and Q. Bitrnaps (with length 4) flom P and Q are shown in Figure 3.3:a as received by the new node R. The shared ‘0’s in the bitmaps of P and Q indicate a feasible time region for node R to choose a Tx-slot flom. The feasible region is indicated in the figure. a Feasible slot 1 l 0 0 , available ”WSW ll Slots