Practical Experiences and Design Considerations on Medium Access Control Protocols for Wireless Sensor Networks

Practical Experiences and Design Considerations on Medium Access Control Protocols for Wireless Sensor Networks

Junaid Ansari (RWTH Aachen University, Germany), Xi Zhang (RWTH Aachen University, Germany) and Petri Mähönen (RWTH Aachen University, Germany)
DOI: 10.4018/978-1-61520-701-5.ch007
OnDemand PDF Download:


In this chapter, the practical and experimental aspects of medium access control protocol design for wireless sensor networks are discussed. We outline the basic design principles of medium access control procedures and the general development trends from the perspective of real world implementations. We take into account especially energy consumption and latency requirements. We share our experiences gained in practical research and pre-commercial projects, wherein we have been tackling issues such as traffic awareness, coexistence of different protocols, spectrum agility for wireless sensor networks and porting of MAC-layers to different platforms. The contemporary focuses on medium access control design such as cross-layer approaches, multi-radio based protocols and radio wake-up based medium access solutions are also covered in this chapter.
Chapter Preview


Medium Access Control (MAC) protocols and Link Layer Control protocols are responsible for reliable and efficient transfer of information across physical links. MAC protocols in wireless sensor networks control radio activities and coordinate nodes to access the shared communication medium. Since wireless medium is inherently broadcast in nature, the MAC-layer is a very important part of wireless systems. If the nodes do not coordinate while transmitting, data from different nodes transmitted at the same time will be superimposed and consequently the packet transmission may be lost due to collisions.

MAC protocols are designed based on different network characteristics and application requirements. Wireless Sensor Networks (WSNs) have a broad range of applications. These include the military domain, such as battlefield surveillance (Alshrabi et al., 2008), environmental and habitat monitoring (Szewczyk et al., 2004), healthcare applications (Kim et al., 2007), home automation (Mozer, 2004), traffic control (Chen et al., 2005), etc. In most of the application scenarios, sensor nodes are battery powered and deployed at remote locations or in massive scale. This makes battery service or replacement difficult. Sensor networks are expected to be in operation for years to make a WSN solution economically viable. The classical performance metrics for network services include throughput, latency, fairness, delivery rate, etc. However, due to the limited energy supply to sensor nodes and the requirement for long lifetime, reducing power consumption in WSNs has become one of the primary objectives for designers (Demirkol et al., 2006).

Sources of energy consumption in sensor nodes include radio communication, computation and sensing activities. The energy consumption of sensing activities is independent of the communication protocol stack and thus out of scope for this chapter. Radio communication bears a much heavier energy consumption than computation. MAC protocols, which directly control radio activities, play an important role in determining the power consumption in data communication for sensor networks. Therefore, WSN MAC protocol designs are focused more towards energy conservation than towards classical performance metrics. Although WSN applications still impose different requirements on latency, throughput and reliability, energy consumption remains as the most important optimization goal. This makes the design of MAC protocols for WSNs unique and challenging. One of the challenges is that power consumption is often difficult to be estimated theoretically since it depends on implementation specific knowledge.

Vast literature exists on fundamentals of MAC protocols, especially on their theoretical underpinnings. In this chapter, we focus on some of the practical issues of sensor network MACs that are of high interest to engineers and researchers wishing to implement and deploy MAC solutions on a real hardware platform in real-world applications. Thus, we bias our discussion towards providing specific lessons learned from implementation projects in order to bridge the gap between theory and practice. Furthermore, we extend our discussion to include comments on the implementation complexity, memory usage, fault tolerance and the availability of compatible hardware for realizing the design. This chapter begins with the background information on the trends of MAC protocol development and their analysis from a practical perspective. We have implemented a number of MAC solutions based on various suggested methods in order to meet the power consumption limits in different projects. A detailed discussion on the practical aspects of design, implementation, performance evaluation and the integration of these MAC protocols is presented in this chapter. These designs consider traffic awareness in MAC protocols, multi-radio platforms and wake-up radio based solutions. Empirical studies on the coexistence of a sensor network with other networks, and spectrum agility aspects are also highlighted. The cross-layer design aspects are covered with two experimental designs and portable MAC architectures are introduced afterwards. Finally, we conclude the chapter.

Key Terms in this Chapter

Preamble Sampling/Channel Polling Protocols: Preamble sampling or channel polling protocols refer to a set of CSMA/CA based protocols where all the nodes wake-up asynchronously, sniff for the activity in the medium and go back to sleep. A long preamble is transmitted before the data so that all the waking-up nodes notice an upcoming data packet.

Low Power Listening (LPL): Low power listening refers to the operation in which nodes periodically turn on and off the radios.

Time Division Multiple Access (TDMA): Time Division Multiple Access is a channel access scheme with time slices or time slots for each of node in the neighbourhood. Each node receives data in its assigned time slot.

Contention based Channel Access: In contention based channel access, all the nodes compete with each other for accessing the channel in order to transmit a packet.

Medium Access Control (MAC): Medium Access Control refers to the procedure for accessing the shared the medium (wired/wireless) for data communication.

Carrier Sense Multiple Access (CSMA): CSMA refers to the mechanism of a node to find the channel free from any other on going transmission before attempting to transmit a packet. Simultaneous transmission of packets by different nodes can lead to packet collisions, which makes it incomprehensible at the receiving node(s).

Cross-layer Optimization: Cross-layer optimization in networks refers to obtaining enhanced network performance by exploiting the information across layers of the networking stack. Strict layered approach does not allow exchanging certain parameters and metadata that favour system performance.

Clear Channel Assessment (CCA): Clear channel assessment refers to the method of finding the state of the channel, which is suitable for data transmission.

Complete Chapter List

Search this Book: