1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

IEEE CSMA/CA DCF CSE 6590 Fall /7/20141.
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
Medium Access Issues David Holmer
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani Free University of Bozen-Bolzano Lesson 1 – Local network.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Isolation of Wireless Ad hoc Medium Access Mechanisms under TCP Ken Tang,Mario Correa,Mario Gerla Computer Science Department,UCLA.
Wireless LAN Simulation - IEEE MAC Protocol
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
1 Dynamic Adaption of DCF and PCF mode of IEEE WLAN Abhishek Goliya Guided By: Prof. Sridhar Iyer Dr. Leena-Chandran Wadia MTech Dissertation.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
1 Chap. 4 Data link layer 3. 2 MAC(medium access control) model MAC  If two nodes are transmitted simultaneously, collision of two frames is occurred.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
MAC Protocols for Sensor Networks
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
Medium Access Control MAC protocols: design goals, challenges,
CT301 LECTURE 8.
Contention-based protocols with Reservation Mechanisms
MACAW: A Media Access Protocol for Wireless LAN’s
SENSYS Presented by Cheolki Lee
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya Modified and Presented.
Channel Allocation (MAC)
Net301 lecture9 11/5/2015 Lect 9 NET301.
IEEE : Wireless LANs ALOHA, Slotted ALOHA
Multiple access.
Vehicular Communication Technology
THE IEEE MAC SUB-LAYER – chapter 14
Multiple Access Methods
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
The Medium Access Control Sublayer
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Wireless LAN Simulation IEEE MAC Protocol
Subject Name: Adhoc Networks Subject Code: 10CS841
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
November 2008 Hybrid MAC for VANET Date: Authors:
Presentation transcript:

1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept of Computer Science Trinity College, Dublin Supported by the

2 Overview Introduce Real-Time Wireless Issues and Challenges Our Proposal, TBMAC Summary

3 Real-time what do we mean? Much confusion exists over the meaning of “real-time” The IEEE define a real-time system as: “A real-time computer system is a computer system in which the correctness of the system demands not only on the logical results of the computations but also the physical instant at which these results are produced” We have both a temporal and computational accuracy requirement

4 Real Time Systems Event Triggered –Processing initiated for each event Asynchronous –Need to cope with varying load Deterministic execution? Time Triggered –Events processed at predetermined intervals Synchronous –System specified for a known bounded load –Can reserve communication bandwidth in advance

5 Our Wireless Domain Short range wireless communication Highly dynamic network –Mobility High risk of node failure Limited bandwidth No central point of control

6 Media Access with CSMA/CA Carrier sense media access collision avoidance –Two methods of carrier sensing Physical – Actually listen Virtual – Have prior knowledge that someone else (may) be transmitting –Can’t listen and transmit at same time Avoidance not detection

7 Fair Vs Time Bounded Under CSMA must contend for medium for every transmission –Promotes fairness –No state information to maintain –Unsuitable for time bounded traffic Capture –A station which accesses the medium first can lock out other stations for a significant duration

8 Channel Access in

9 4 Key Observations Contention is at the receiver not the transmitter Congestion is location dependant. Each node should propagate congestion information. There is a need for synchronisation to ensure effective use of the contention windows. Bharghavan, V et al, MACAW: A media mac protocol for wireless LAN’s. SIGCOMM Comput. Commun. Rev. 24, 4 (1994)

Issues Contention resolved non deterministically –Optimistic media access –Exponential random back off function Beacon Frames –Sent by stations to seek out other stations Provides the “Plug n’Play” element of Low level MAC layer function Key to protocol –Shares same CSMA access method Beacons contend with data traffic

Issues Quality of Service –802.11e still fundamentally b Adds separate queues for traffic types Some changes in media access priority Fixed access point only –802.11p for Distributed Short Range Communication (DSRC) Basically a Shared control channel To be used to provide inter vehicle safety information in automotive applications

12 Chaos in

13 Time Division Multiple Access TDMA, Time Division Multiple Access A slotted medium access control protocol Only one station can transmit in each slot –Packet transmission is collision and contention free –Deterministic transmission delays

14 What is TBMAC? Real Time Medium Access Control –Deterministic communication to support a wide range of distributed applications Supports time triggered protocols Based on TDMA Distributed co-ordination –No single point of failure –Reliable atomic multicast protocol

15 What is TBMAC? Need location service to select cell frequency –Emerging trend to fit GPS Cellular Structure –Spatial reuse Intercell comunication –Transmission range overlaps

16 What is TBMAC ? Solves TDMA bootstrapping problem –To transmit you need a slot –If you can’t transmit you can’t request a slot !!! Divides the TDMA cycle into: –A contention free period using TDMA –A contention period using slotted CSMA Each packet contains a slot bitmap –Data structure with brief details of slot allocations

17 Stability with TDMA

18 Chaos in

19 Current Status Full implementation in NS2 simulator –Fully evaluated Software implementation using –Software implementation is restricted Still have CSMA active on card Performance overhead A hardware implementation is planned –Improved performance –Avoid issues

20 In Review Defined Real-Time –Temporal and computational accuracy requirement –Challenging practical demands –Time triggered protocols best suited Shown unsuitable –Adapting not possible –Randomness, Beacons, Carrier Sense Introduced TBMAC –Deterministic communication to support a wide range of distributed applications

21

22 Chaos in