Efficient Application Level Message Coding and Composition

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
CCH: Cognitive Channel Hopping in Vehicular Ad Hoc Networks Brian Sung Chul Choi, Hyungjune Im, Kevin C. Lee, and Mario Gerla UCLA Computer Science Department.
Doc.: IEEE /0104r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Channel Selection Support in TVWS Date: Authors:
Vehicular Networking An introduction
Distributed Systems: Concepts and Design Chapter 1 Pages
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
-Internet On Road. INTRODUCTION Driving means constantly changing location. This, in turn, means a constant demand for information on the current location.
PART1 Data collection methodology and NM paradigms 1.
2 Overhead & channel use for multiple messages. Unused elements in common message set. Security? A new message for each new application? Where to change.
SPIN: Sensor Protocols for Information via Negotiation
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Chapter 2 PHYSICAL LAYER.
Routing Metrics for Wireless Mesh Networks
Packet Switching Networks & Frame Relay
FILS Reduced Neighbor Report
Routing Metrics for Wireless Mesh Networks
Zone Routing Protocol (ZRP)
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
Network Architecture Layered Architectures Network Protocols
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Operating Systems (CS 340 D)
VANET.
Direct Attached Storage and Introduction to SCSI
Distribution and components
ITS-Related Work Items in ITU-R Study Group 5, Working Party 5A
Understanding the OSI Reference Model
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Internet Networking recitation #12
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Vehicular Communication Technology
Improve Scanning for Identifying Transmitted BSSID
Chapter 8: Subnetting IP Networks
Routing Metrics for Wireless Mesh Networks
Demand of Being Woken Up While Moving Follow-up
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Multiple Frequency Channel Scanning
Enhancements to Mesh Discovery
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Enhancement to Mesh Discovery
NGV SG Use Cases (Next Generation V2X Study Group)
Data collection methodology and NM paradigms
Switching Techniques.
FILS Reduced Neighbor Report
Robert Moskowitz, Verizon
Architecture Competency Group
An Introduction to Software Architecture
Net 323 D: Networks Protocols
Chapter 2: Operating-System Structures
Subject Name: Adhoc Networks Subject Code: 10CS841
Month Year doc.: IEEE yy/xxxxr0
(60GHz New Technique Proposal)
Protocols.
Smart Grid Technology Discussions 2010
P802.11aq Waiver request regarding IEEE RAC comments
Response to Coexistence Presentations
Chapter 2: Operating-System Structures
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Channel usage in NGV: follow-up
Protocols.
Presentation transcript:

Efficient Application Level Message Coding and Composition Students: Ella Cohen & Fanny Nahum Date: 21.5.2012

...In this presentation Introduction to the Application Environment Safety applications and data requirements Desirable architectural features Broadcast characteristics Message Dispatcher Data element dictionary Message construction What and when to send Presentation Summary

Introduction As we move toward the large-scale deployment of wireless inter-vehicle communication systems, we must consider some real-world implementation issues and tradeoffs. For example, demands on the wireless channel will evolve as more vehicles become equipped, and new and evolving applications generate new data and transmission requirements. a standardized communication interface is required! One of our challenges is deployment of a standard system that efficiently uses the finite wireless medium and yet can support future application requirements.

“Standardization can only go so far, because we can’t anticipate all possible future needs.” (Berners-Lee et al. 2001)

Safety applications and data requirements Significant efforts, have been made to identify which communication-enabled vehicular safety applications will provide the greatest benefit Eight such applications were identified shown in Table 8.1 along with their proposed communication requirements. We highlight the fact that these requirements have only been proposed As a consequence, any communication protocol must be sufficiently flexible to enable changing requirements

Eight high-priority vehicular safety applications:

Considering Table 8.1, it appears that applications with the greatest safety potential rely heavily on single-hop broadcast communication with nearby vehicles and infrastructure This communication is expected to have devices from various manufacturers implementing distinct applications. Moreover, many vehicles are likely to run multiple safety applications concurrently. Each application is likely to have different, although overlapping, data element requirements many safety applications may require the vehicle speed, vehicle location, current turning radius, etc

Dedicated short range communications (DSRC) vehicle data elements

Earlier revisions and problems: In earlier revisions of the SAE standard (prior to 2006), the messages were all of fixed size, structure, and content. This approach had the potential to generate packets with redundant data. Some data in a fixed message might not be used at all, whereas in other cases, individual applications may require a different message information that changes slowly or infrequently (e.g., windscreen wiper status) need not be sent frequently.

Desirable architectural features Future-proof: Vehicles will broadcast data that is probably valuable for multiple surrounding vehicles with multiple safety applications. However, creating and testing these safety applications is an ongoing effort. Therefore, a scheme must be backward compatible as well as future-proof to newly defined, evolving, or upgraded applications.

Flexibility: It seems likely that in the heterogeneous marketplace for vehicles, different vehicles will be running different subsets of safety applications. A scheme should be sufficiently flexible to account for this.

Extensible: It is conceivable that not all safety applications will be universally standardized. Hence, a mechanism for adding support for non-standardized data elements (e.g. proprietary to one or more manufacturers) is desirable

Unified interface: From an implementation perspective, it is attractive to construct an architecture where policy and self-policing between various applications, within a single vehicle, can be managed in a single entity. Further, authentication and other security primitives would ideally be managed collectively across safety applications.

Layered architecture: By providing a layered architecture that abstracts the message sending interface from the application designer, a separation of concerns for the application designer is achieved. This enables easier, faster and more modular development.

Low bandwidth usage: The available bandwidth is a finite resource and should be conserved wherever possible. Real-world testing by the VSCC (USDOT 2006) demonstrates that the channel capacity is an issue that will need to be addressed for large-scale deployment and in heavy traffic environments.

Information rate: Some data elements, such as headlight status, change infrequently.Thus, a solution should distinguish these properties and transmit information only when it is appropriate.

Recognize vehicle capabilities: Not all vehicles will be able (or willing) to measure and transmit certain pieces of information. This should be reflected in the message construction.

Enable product differentiation: Vehicle manufacturers desire the ability to provide unique applications and services to their customers. The functionality of these services should not be limited to the applications that are currently deployed or enabled by other vendors.

Broadcast characteristics: Maximum transmission range of 300 meters. We assume that safety messages broadcast their messages in a single hop. Messages will contain data elements useful to multiple vehicles in the nearby vicinity.

The problems: The immediate neighbours of a vehicle will change frequently. Coordinating transmission between vehicles will be difficult. Packet interference and loss seem likely.

A solution proposal: Message dispatcher architecture

General Description: sending message: The message dispatcher assimilates data requirements from all the on-board applications. Compiles a single message using a dictionary of defined data elements Standardized message construction guidelines.

General Description - Cont. Receiving message: A receiving message dispatcher is responsible for separating the data elements from the received message. Disseminating data elements from the received message to all on-board applications. Managing data requirements for surrounding vehicles.

Message Dispatcher - Let’s get down to the details:

Message Dispatcher - Let’s get down to the details: The Message Dispatcher’s responsibility is to coordinate all the data exchange requirements of the applications running on a vehicle. Serving as an interface between the application layer and the communication stack. Safety applications will register or send data elements to be broadcast to the MD.

Message Dispatcher - Cont. The MD then summarizes these data elements across applications and creates a single packet comprising the minimum set of the data elements to be transmitted. The MD would also consider data requirements of other surrounding vehicles or roadside units. The combined message is then sent to the DSRC radio for broadcast.

Message Dispatcher - Cont. Any vehicle that receives a message would provide all on-board applications with the data elements they require. The message dispatcher design can be divided into two broad topics: First, the definition of a data element dictionary. Second, the specification of how these elements should be combined into a message.

Data element dictionary

Data element dictionary This section describes how data elements may be identified and formatted in a ‘data element dictionary’.

Data element dictionary – Cont. A message can be constructed by creating a string of unique identifiers followed by the value of the data element. This unique ID overhead can be reduced when related data elements are grouped into a ‘data frame’. Each data frame consists of data elements in a specified order and thus their unique IDs are not required within the data frame.

Data element dictionary – Cont. The SAE standard (SAE 2008) identifies over 150 data elements in its dictionary. Adding or modifying a data element under this architecture is relatively straight- forward. The data dictionary would need to be updated and resubmitted to a central authority for updating the standard.

Message construction The process for constructing a message amounts to including data elements and frames prefixed by their unique identifier. A receiving MD can interpret this message based on the contents of its own data dictionary. The definition of an escape character can indicate the start of a data element.

Message construction – Cont. The escape character will immediately be followed by a unique tag, of fixed length, that identifies the subsequent data. The SAE standard (SAE 2008) divides messages into two sections: The first section is used to include data frames using their unique identifier followed by the series of data elements comprising the data frame. The second section is used to include individual data elements that have not already been included in the first section.

What and when to send

What and when to send Determining what elements are required to be sent by a vehicle in order to satisfy surrounding vehicles is a general problem in all mobile ad- hoc networks. There has been no robust methods proposed to obtain specific information from a newly encountered vehicle. Sending a large packet, comprising all defined data elements, at the maximum required rate among all elements is very inefficient.

What and when to send – Cont. We propose two possible solutions so as to illustrate the utility of the MD architecture: Match received message: If a message dispatcher receives a message with a data element it is not currently transmitting, it should include its own version of that data element in the following transmission. In this way it ‘matches’ the incoming message. To avoid a ‘racing’ situation, the original sender could include a data element indicating whether its message contents should be matched.

What and when to send – Cont. What is a ‘racing’ situation? Vehicle A sends a message that the message dispatcher on vehicle B matches on subsequent transmissions. Although Vehicle C is beyond the range of interest of vehicle A, it too begins to match the message resulting in a ‘racing’ condition.

What and when to send – Cont. Request data elements: Define and send a Data Element that specifically requests certain elements. This solution would be useful in probe-type applications where a roadside unit requests information from passing vehicles.

Thanks for listening