The Wireless Token Ring Protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Chapter 1: Introduction
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Implementing WTRP on QNX Ruchira S. Datta Berkeley WOW Group.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
Web over Wireless Group An Overview of the Web over Wireless Group Web over Wireless Group UC, Berkeley.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
ISCC Antalya, 2003WTRP1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE Mustafa Ergen, Duke Lee, Raja Sengupta,
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) A Medium Access Control Protocol for QoS.
Updated 1/20021 SMDS Nirmala Shenoy Information technology Department Rochester Institute of Technology.
04/26/2004CSCI 315 Operating Systems Design1 Computer Networks.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
1Group 07 IPv6 2 1.ET/06/ ET/06/ ET/06/ EE/06/ EE/06/ EE/06/6473 Group 07 IPv6.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
TC 361 Data Networking Test Review
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Chapter 4 Local Area Networks. Layer 2: The Datalink Layer The datalink layer provides point-to- point connectivity between devices over the physical.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
The OSI Model An overview of the media layer (Physical, Data Link, Network) By Luke Shiffner.
Computer networks. Topologies Point to point Bus (rail) Ring Tree, star, etc.
3 rd lecture Presented by Dr. Sarah Mustafa Eljack.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Chapter Objectives In this chapter, you will learn:
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Chapter 12 Multiple Access.
CT301 LECTURE 8.
Local Area Networks Yiannos Mylonas.
Chapter 5 Link Layer and LANs
Contention-based protocols with Reservation Mechanisms
Computer networks.
Shuffle Exchange Point-to-point, Bus, Ring, Star, Mesh
Subject Name: Computer Communication Networks Subject Code: 10EC71
CSC 336 Data Communications and Networking
Multiple Access Methods
Network Fundamentals – Chapter 7
ARCNET (Attached Resource Computer NETwork): The first local area network that connected up to 255 nodes in a star topology at 2.5 Mbps over twisted.
ModelNet: A Large-Scale Network Emulator for Wireless Networks Priya Mahadevan, Ken Yocum, and Amin Vahdat Duke University, Goal:
Network Topologies & Standards
Computer Network Overview
The OSI 7 Layer Model Ben, Stuart, Charles.
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Multiple Access Methods
Dr. John P. Abraham Professor UTPA
Chapter 12 Media Access Control (MAC)
Presentation transcript:

The Wireless Token Ring Protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. The token passing defines the transmission order, and each token is forced to give up the token after a specified amount of time. Each ring has unique ring id based on unique MAC address of one of the stations of the ring. (The station is called the owner of the ring). When owner leaves the ring, another station elects itself to be the owner of the ring. WIRELESS TOKEN RING PROTOCOL WIRELESS TOKEN RING PROTOCOL WW O B E R K E L E Y

Descriptions (Operations) Joining: Stations periodically invite other nodes to join the ring by broadcasting the available resources left in the medium Leaving: When B wants to leave, it requests A to connect to its successor, C. If A does not have connection with C, then it connects to the next node in terms of the transmission order of the ring. AB C D E F 1. SET_SUC C 2. SET_PRED A Invite Contend Token

Descriptions (Management) Ring Recovery Able to recover quickly by keeping information about topology of the ring, recovers from multiple simultaneous faults by taking increasingly drastic actions AB C D E F 2. SET_PRED A 1. Retransmit TOKEN Token Recovery Multiple token is deleted using unique priority of token based on generation sequence number and token ring address pair

WTRP Deliverables WTRP Software Core UDP CORE UDP Implementation IP API WTRP Software Core KERNEL CORE KERNEL Implementation IP Driver WTRP Software Core SIMULATOR CORE SIMULATOR Implementation Channel Model Front End

Performance Analysis

Rotation number Token Rotation Time 3 FTP Flow Performance Analysis