July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) A Medium Access Control Protocol for QoS.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
Chapter 9 Local Area Network Technology
Achieving Quality of Service in Wireless Networks A simulation comparison of MAC layer protocols. CS444N Presentation By: Priyank Garg Rushabh Doshi.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Distributed Control Algorithms for Service Differentiation in Wireless Packet Networks Michael Barry, Andrew T Campbell, Andras Veres
Implementing WTRP on QNX Ruchira S. Datta Berkeley WOW Group.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Dynamic Bandwidth Scheduling for QoS Enhancement over IEEE WLAN Sangwook Kang, Sungkwan Kim, Mingan Wang, Sunshin An Korea University European Wireless.
The Wireless Token Ring Protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service.
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Traffic Forecasting Medium Access TRANSFORMA Vladislav Petkov Katia Obraczka 1.
ADHOC – MAC : a new, flexible and reliable MAC architecture for ad-hoc networks F. Borgonovo, A. Capone, M. Cesana, L. Fratta Dipartimento Elettronica.
ISCC Antalya, 2003WTRP1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE Mustafa Ergen, Duke Lee, Raja Sengupta,
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
MAC Protocol By Ervin Kulenica & Chien Pham.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
Medium Access Control Protocols Using Directional Antennas in Ad Hoc Networks CIS 888 Prof. Anish Arora The Ohio State University.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
QoS Support in High-Speed, Wormhole Routing Networks Mario Gerla, B. Kannan, Bruce Kwan, Prasasth Palanti,Simon Walton.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Tufts University. EE194-WIR Wireless Sensor Networks. April 21, 2005 Increased QoS through a Degraded Channel using a Diverse, Cross-Layered Protocol Elliot.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Real Time Protocol (RTP) 김 준
An Adaptive, High Performance MAC for Long- Distance Multihop Wireless Networks Presented by Jason Lew.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He.
1 Chap. 4 Data link layer 3. 2 MAC(medium access control) model MAC  If two nodes are transmitted simultaneously, collision of two frames is occurred.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Planning and Analyzing Wireless LAN
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
A new Cooperative Strategy for Deafness Prevention in Directional Ad Hoc Networks Andrea Munari, Francesco Rossetto, and Michele Zorzi University of Padova,
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Improving the scalability of MAC protocols in Wireless Mesh Networks Mthulisi Velempini (Mr.)
Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002.
Click to edit Master title style Click to add subtitle © 2009 Wichorus Inc. All rights reserved. Multi-hop Ad Hoc Wireless Communication Autoconf WG November.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-layer Addressing.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Musical Instruments Connecting to a Mixer using Tal Kesari & Shimon Korenman Advisor: Dr. Chen Avin.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
2. Data Link Layer: Medium Access Control. Scheduling.
Chapter 5 Link Layer and LANs
THE IEEE MAC SUB-LAYER – chapter 14
Communication Networks NETW 501
Goal Control the amount of traffic in the network
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol1 UC Berkeley WOW Wireless Token Ring Protocol (WTRP) A Medium Access Control Protocol for QoS Aware Wireless Networks Mustafa Ergen, Duke Lee, Ruchira Datta, Jeff Ko, Roberto Attias, Anuj Puri, Raja Sengupta, Starvros Tripakis, and Pravin Variaya

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol2 UC Berkeley WOW Automated Vehicle Platoon Real-time safety critical control over ad-hoc network Vehicles transmit control data in round robin every 20 ms Wireless Quality of Service

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol3 UC Berkeley WOW Merge Lane Distributed solution Need wireless QOS Admission control

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol4 UC Berkeley WOW Motivations for WTRP Quality of service (real time applications) Distributed solution (robust against a single node failure) Flexible topology (token ring can be created with Pico cells) Safety critical applications (need fast recovery from failure) No need for clock synchronization (compared to TDMA) Partial connectivity (hidden terminal problem)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol5 UC Berkeley WOW Motivations for WTRP Quality of service (real time applications) Distributed solution (robust against a single node failure) Flexible topology (token ring can be created with Pico cells) Safety critical applications (need fast recovery from failure) No need for clock synchronization (compared to TDMA) Works on partial connectivity (no hidden terminal problem)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol6 UC Berkeley WOW Motivations for WTRP Quality of service (real time applications) Distributed solution (robust against a single node failure) Flexible topology (token ring can be created with Pico cells) Safety critical applications (need fast recovery from failure) No need for clock synchronization (compared to TDMA) Works on partial connectivity (no hidden terminal problem) centralized ( PCF, Bluetooth)distributed (token ring)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol7 UC Berkeley WOW Motivations for WTRP Quality of service (real time applications) Distributed solution (robust against a single node failure) Flexible topology (token ring can be created with Pico cells) Safety critical applications (need fast recovery from failure) No need for clock synchronization (compared to TDMA) Works on partial connectivity (no hidden terminal problem) TDMA

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol8 UC Berkeley WOW Motivations for WTRP Quality of service (real time applications) Distributed solution (robust against a single node failure) Flexible topology (token ring can be created with Pico cells) Safety critical applications (need fast recovery from failure) No need for clock synchronization (compared to TDMA) Works on partial connectivity (no hidden terminal problem)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol9 UC Berkeley WOW Additional Challenges From Wireless Medium Partial connectivity (unable to hear all nodes in a ring) Support for multiple rings Self-managed admission control Frequent packet loss, corruption

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol10 UC Berkeley WOW Solutions: Connectivity Table Each node builds and updates connectivity table that contains information of all stations in its reception range, and transmission order of the nodes in its ring

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol11 UC Berkeley WOW Solutions: Connectivity Table Each node builds and updates connectivity table that contains information of all stations in its reception range, and transmission order of the nodes in its ring

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol12 UC Berkeley WOW Ring Recovery B fails or moves out of range. A tries to transmit to its successor (B) a specified number of tries and determine that communication link to B is bad. AB C D E F 2. SET_PRED A 1. Retransmit TOKEN 0. Transmit TOKEN

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol13 UC Berkeley WOW Solutions: Unique Ring Address Each ring has unique ring id based on unique MAC address of one of the stations of the ring.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol14 UC Berkeley WOW Solutions: Unique Priority of Token Based on ring address and generation sequence number pair. Station only accept token that has higher priority than the last token that the station has accepted. ring addressgeneration sequence …

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol15 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol16 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol17 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol18 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution) At next step Delete token with generation sequence number 2 since the next node has seen token with generation sequence number 6

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol19 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol20 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol21 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution) Token refreshed by owner

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol22 UC Berkeley WOW Token Recovery (Multiple Tokens Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol23 UC Berkeley WOW Token Recovery (Ring Address Resolution) Suppose that the owner of the token has failed

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol24 UC Berkeley WOW Token Recovery (Ring Address Resolution) This node detects that the owner is down and claims the token 8

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol25 UC Berkeley WOW Token Recovery (Ring Address Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol26 UC Berkeley WOW Token Recovery (Ring Address Resolution)

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol27 UC Berkeley WOW QOS Interface High Priority Applications (6)Low Priority Applications (6,3) Wireless Token Ring Protocol (10) Register 6

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol28 UC Berkeley WOW QOS Interface High Priority Applications (6)Low Priority Applications (6,3) Wireless Token Ring Protocol (4) Granted Register 6

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol29 UC Berkeley WOW QOS Interface High Priority Applications (6)Low Priority Applications (6,3) Wireless Token Ring Protocol (4) GrantedHandler Register 3

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol30 UC Berkeley WOW QOS Interface High Priority Applications (6)Low Priority Applications (6,3) Wireless Token Ring Protocol (1) Granted

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol31 UC Berkeley WOW WTRP Deliverables (2001) WTRP Software Core UDP CORE UDP Implementation IP API WTRP Software Core KERNEL CORE LINUX KERNEL Implementation IP Driver WTRP Software Core SIMULATOR CORE SIMULATOR Implementation Channel Model Front End

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol32 UC Berkeley WOW UDP: Video Streaming

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol33 UC Berkeley WOW Simulation Front End

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol34 UC Berkeley WOW A B A B A B Token Rotation Time Vs. Rotation C C C

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol35 UC Berkeley WOW Fairness

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol36 UC Berkeley WOW Throughput Comparison With DCF

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol37 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol38 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol39 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol40 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol41 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol42 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

July 15, 2002 SCI02 ORLANDO Wireless Token Ring Protocol43 UC Berkeley WOW Conclusions The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. It supports quality of service in terms of bounded latency and reserved bandwidth. WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. It can be used with an admission control agent for bandwidth or latency reservations. WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.