Presented by: Dr. Khaled A. Ali Urgency-based MAC Protocol for WSBANs WiSense Seminar Series.

Slides:



Advertisements
Similar presentations
Doc: IEEE July/2009 Zhen, Li and Kohno Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Advertisements

Nov. 2 th, 2010 Hyung Wook Cho Utilization-Aware Dynamic GTS Allocation Scheme in IEEE APCC 2010.
An introduction Jan Flora Department of Computer Science University of Copenhagen.
A G3-PLC Simulator for Access Networks Speaker : Jiun-Ru Li Advisor : Dr. Kai-Wei Ke 2014/11/18.
Ubiquitous Healthcare Using MAC Protocols in Wireless Body Area Sensor Networks (WBASNs)
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
1 Mohammad Ariful Huq Supervisor : Eryk Dutkiewicz Minimizing Channel Access Delay for Emergency Traffic in IEEE  Wireless Body Area Network.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
ECGR-6185 ZIGBEE Advanced Embedded Systems University of North Carolina –Charlotte Gajendra Singh Some figures borrowed from Zigbee Alliance web pages.
Design and Simulation of MANET Architecture over ZigBee Protocol Suite with Layer ColaborativeEnergy aware design for Performance Optimization Rupam Das.
IEEE (ZigBee) Standard. Home Networking Automotive Networks Industrial Networks Interactive Toys Remote Metering Application Space.
Topic 3: Sensor Networks and RFIDs Part 4 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
Zigbee By: Adel Al-Ghamdi Adel Al-Ghamdi Yousef Al-Rasheedi Yousef Al-Rasheedi For: Dr. Adnan Al-Andalusi.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Ultra Wide Bandwidth (UWB) MAC and Networking Future Networking Research Topic Ke Liu Dec. 18, 2006.
Standard for Low Rate WPAN. Home Networking Features. Wired and Wireless Networks. Advantages of Wireless. Need for low power consumption. Bluetooth:
A Survey on Energy Efficient MAC Protocol for Wireless Sensor Networks Huma Naushad.
Performance Evaluation of IEEE
Analysis of the Performance of IEEE for Medical Sensor Body Area Networking ECE 5900 Computer Engineering Seminar Instructor: Dr. Chigan Huaming.
Fault Tolerance in ZigBee Wireless Sensor Networks
ZIGBEE Compared to BLUETOOTH
ZigBee. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion Topics.
1 The Simulative Investigation of Zigbee/IEEE By, Vaddina Prakash Rao Under the Guidance of, Dipl.-Ing. Dimitri.
IEEE and Zigbee Overview. Topics ZigBee Competing Technologies Products Some Motorola Projects Slide 2Joe Dvorak, Motorola9/27/05.
1 Intermediate report on Performance Analysis of Zigbee Wireless Personal Area Networks By, Vaddina Prakash Rao Under.
ZigBee.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Lecture #2 Chapter 14 Wireless LANs.
ZigBee/IEEE Overview Y. C. Tseng.
IEEE Harald Øverby.
IEEE Draft Standard Presented by Arsalan Tavakoli CS October 18, 2005.
IEEE Tutorial Pat Kinney Open House June 3, 2003.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
1 ZigBee/IEEE Overview. 2 New trend of wireless technology Most Wireless industry focus on increasing high data throughput A set of applications.
Doc.: IEEE k Submission July, 2011 Slide 1 Inha Univ/ETRI Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /272r0 Submission June 2001 Phil Jamieson, Philips SemiconductorsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Analysis of the scalability of hierarchical IEEE /Zigbee networks 1 Departamento de Tecnología Electrónica. University of Málaga ETSI de Telecomunicación,
Samer Shammaa Telecommunications Eng. Dept. Dr. Pramode Verma.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Planning and Analyzing Wireless LAN
Chapter 15 Wireless LANs 15.# 1
Performance Evaluation of IEEE
A Cluster Based On-demand Multi- Channel MAC Protocol for Wireless Multimedia Sensor Network Cheng Li1, Pu Wang1, Hsiao-Hwa Chen2, and Mohsen Guizani3.
MAC Hurdles in Body Sensor Networks Name : Tahani Mohammad Al-lihaibi ID:
Performance Investigation and Optimization of IEEE for Industrial Wireless Sensor Networks MOHSIN HAMEED, HENNING TRSEK, OLAF GRAESER AND JUERGEN.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Network System Lab. Sungkyunkwan Univ. Differentiated Access Mechanism in Cognitive Radio Networks with Energy-Harvesting Nodes Network System Lab. Yunmin.
IEEE Wireless LAN Standard
IEEE MAC protocol Jaehoon Woo KNU Real-Time Systems Lab. KNU Real-Time Systems Lab.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
Lecture 41 IEEE /ZigBee Dr. Ghalib A. Shah
AN EFFICIENT TDMA SCHEME WITH DYNAMIC SLOT ASSIGNMENT IN CLUSTERED WIRELESS SENSOR NETWORKS Shafiq U. Hashmi, Jahangir H. Sarker, Hussein T. Mouftah and.
IEEE : High-rate WPAN Overview
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
A MAC Protocol for Implanted Devices Communication
Low Power Wireless Personal Area Network (LP-WPAN)
CS526 Wireless Sensor Networks
Smart Homes Automation using Z-Wave Protocol
ISM Band Radio Radio Protocols and Topology
doc.: IEEE <doc#>
Chapter 6 Medium Access Control Protocols and Local Area Networks
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
28 October, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Beacon-based Multi-Channel MAC for.
Zafer Sahinoglu, Ghulam Bhatti, Anil Mehta
Presentation transcript:

Presented by: Dr. Khaled A. Ali Urgency-based MAC Protocol for WSBANs WiSense Seminar Series

Introduction Wireless Personal Area Networks WSBAN Application Examples IEEE MAC Protocol Urgency-based MAC Protocol for WSBANs U-MAC Performance Evaluation and Results Concluding Remarks Outline

Massive deployment of Sensor Networks –Stimulated by numerous industry segments, and government organizations –Sensors and RFID tags will begin to inhabit every object –Emergence of smart sensors with local intelligence Traffic volume increases dramatically –Significant architectural changes to global IT infrastructure is expected –Process moves to network edge to aggregate and filter traffic –Directional shift in network traffic Introduction

Integration of WSNs into 4G Networks –Evolution of current ITU and IEEE standards –Connect sensor world with back-end computing environments –Enable end-to-end solutions –Mixed Network Traffic of different priority levels and different bandwidth requirements Introduction IP Network 4G network Sensor Net 2G network 3G network Phone network Other networks Cellular Net

WPAN (General Description): –Low-rate: (250 kb/s, 40 kb/s and 20 kb/s data rates) –Range: meters –Low power consumption –Addresses: short 16-bit or long 64-bit –Channels: 16 channels (2450 MHz band), 10 channels (915 MHz band ) and 1 channel (868 MHz band) –Access mechanisms: CSMA/CA or Aloha –Reliability : Fully acknowledgement, error checking –Cost: Low cost of deployment –MAC& PHY: IEEE and IEEE a Wireless Personal Area Networks

WPAN (Network Topology): Wireless Personal Area Networks FFD (PAN)RFD star topology peer-to-peer topology

WPAN (Layered Architecture): Wireless Personal Area Networks Upper Layers MAC PHY Physical Medium SSCS LLC

Non-invasive WSBANs: –Monitoring and sensing signals from the human body for medical applications –Distributed communication over the human body Invasive (In-Body) WSBANs: –Connect implanted medical devices (MICS band) and on-body sensors (ISM band) –Miniature “Pill camera” Images and medical data are transmitted to a central WS View, edit, archive and the live video, images and date Physician can observe and detect exact location of suspected “in-body” disorder Patient data can be sent through the network to establish a diagnosis and trigger the required actions via actuators WSBAN Application Example Personal Health Care-mixed data rates

RFID tag integrated in the watch allows entrance in the conference room Presentation can be downloaded from nodes in the room Business cards are exchanged by handshake Additional information can be displayed by video glasses Using microphone/motion sensors the main processing unit becomes aware of the meeting and automatically blocks phone calls WSBAN Application Example Business Meeting-mixed data rates

MAC Sublayer –Generating Network beacons (PAN) –Synchronization –PAN association and disassociation –CSMA-CA –GTS IEEE MAC Protocol INACTIVE Beacon CFP(GTS)CAP CAP- Contention Access Period CFP- Contention Free Period GTS- Guaranteed Time Slots

Objectives: –Supporting QoS in WSBANs for medical applications –Increasing network throughput –Minimizing packet rejection rate –Minimizing power consumption Approach: –Star network topology –Controlling the number of packet retransmission High priority traffic contend more for the transmission medium than low priority traffic –Slotted Aloha access mechanism Urgency-based MAC Protocol for WSBANs

Traffic Classification –Critical Traffic –Non-Critical Traffic Arrival Rate –New Packet Arrival rate (λ) Critical packet arrival rate Non critical packet arrival rate –Retransmitted packet arrival rate (λ r ) Retransmission Queues Urgency-based MAC Protocol for WSBANs U-MAC Block diagram C1C1 C2C2 C3C3 CrCr λ λ + λ r Channel Success Collision

Packet Transmission Scenario: –Number of critical packet retransmission s; r c = 3 –Number of non critical packet retransmissions ;r nc = 2 Urgency-based MAC Protocol for WSBANs PcPc P nc 32 rcrc r nc 21 10

Beacon frame enabled Star network topology RFD nodes communicate with a single FFD RFD nodes composed of critical nodes and non critical nodes Critical nodes contend for the medium r c times Non critical nodes contend for the medium r nc times U-MAC Performance Evaluation and Results Maximum number of Critical Nodes Critical Nodes Packet Arrival Rate Network Throughput

Maximum Number of Critical Nodes N c –Aggrigate Packet Arrival rate G=1 –Number of Critical Nodes U-MAC Performance Evaluation and Results

Maximum Number of Critical Nodes N c (Cont.) –N total =20 G=1 –λ c =0.05, 0.06 –λ nc =0.015 –r nc = 0, 2, 5 –r c = 0- 5 U-MAC Performance Evaluation and Results

Critical Packet Arrival Rate –N total =20, N c =5 G=1 –λ nc =0.015 –r nc = 0, 2, 5 –r c = 0- 5 U-MAC Performance Evaluation and Results

Network Throughput –Critical Nodes Throughput –Non Critical Nodes Throughput U-MAC Performance Evaluation and Results

Network Throughput (Cont.) –N c =10 N nc =10 r nc = time slots each of 1 sec. U-MAC Performance Evaluation and Results λ c =λ nc =0.025 λ c =λ nc =0.03

An Urgency-Based MAC protocol for WSBAN is proposed U-MAC protocol differentiates nodal medium access based of the criticality of the reported traffic Critical traffic is allowed to retransmit collided packets more than non critical traffic U-MAC protocol performance is evaluated mathematically and through simulation The performance results show the ability of the proposed protocol to differentiate network traffic Concluding Remarks

Thank you