Ad Hoc Nets - MAC layer Part II – TDMA and Polling.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Presentation by Anna La Mura and Marcus Nagel TIM01AGR
BLUETOOTH TM :A new radio interface providing ubiquitous connectivity Jaap C.Haartsen Ericssion Radio System B.V IEEE.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Wireless LANs (cont) Bluetooth. What Is Bluetooth? Personal Ad-hoc Networks Cable Replacement Landline Data/Voice Access Points.
Lecture 16: WPAN IEEE (Bluetooth & ZigBee) Anders Västberg Slides are a selection from the slides from chapter 15 from:
CDA 6505 Network Architecture and Client/Server Computing
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 15 Wireless LANs.
Mohamed Mokdad Ecole d’Ingénieurs de Bienne
IEEE (a.k.a. Bluetooth) 2 Bluetooth: King Harold Blatand, or Bluetooth, a Viking and King of Denmark , united Denmark & Norway 1994 –
Mobile Communications: Wireless LANs Mobile Communications Chapter 7: Wireless LANs ª Parte - Bluetooth.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Scatternet Formation in Bluetooth CSC 457 Bill Scherer November 8, 2001.
What is Bluetooth? Bluetooth technology is a peripheral that connects to a variety of products in order to provide wireless connections.
Bluetooth1 Bluetooth Technology Farinaz Edalat, Ganesh Gopal, Saswat Misra, Deepti Rao April 26, 2001.
Distributed systems – Part 2  Bluetooth – 2 nd set of slides Anila Mjeda.
Modeling & Simulation of Bluetooth MAC protocol COE543 Term Project Spring 2003 Submitted by: H.M.Asif (ID# )
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Doc.: IEEE /134r0 Submission 5/00 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Update on the MAC Coexistence.
Bluetooth: Introduction
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
WIRELESS LANs BLUETOOTH.
By Santosh Sam Koshy. Agenda Need for Bluetooth Brief History of Bluetooth Introduction to Bluetooth Bluetooth System Specifications Commercial Bluetooth.
Ad Hoc Nets - MAC layer Part II – TDMA and Polling - Bluetooth.
Distributed Topology Construction of Bluetooth Personal Area Networks Theodoros Salonidis, Pravin Bhagwat, Leandros Tassiulas and Richard LaMaire.
A Bluetooth Scatternet-Route Structure for Multihop Ad Hoc Networks Yong Liu, Myung J. Lee, and Tarek N. Saadawi 2003 IEEE Journal on Selected Areas in.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
Bluetooth Techniques Chapter 15. Overview Universal short-range wireless capability Uses 2.4-GHz band Available globally for unlicensed users Devices.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Introduction to bluetooth. outline Why bluetooth History Bluetooth stack and technology Reference.
Enhancing Bluetooth TCP Throughput via Packet Type Adaptation Ling-Jyh Chen, Rohit Kapoor, M. Y. Sanadidi, Mario Gerla Dept. of Computer Science, UCLA.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
An Introduction to BLUETOOTH TECHNOLOGY
Lecture: Bluetooth and Zigbee Anders Västberg Slides are a selection from the slides from chapter 12,13, and 14 from:
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Example Wireless Networks: WaveLAN, Bluetooth Y. Richard Yang 01/26/2004.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
BLUETOOTH WIRELESS TECHNOLOGY
Qos support and adaptive video. QoS support in ad hoc networks MAC layer techniques: – e - alternation of contention based and contention free periods;
Lectured By: Vivek Dimri Asst Professor CSE Deptt. SET.
Doc.: IEEE /66r0 Submission March 2000 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks WPAN Coexistence.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Bluetooth.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
1 Wireless Networks Lecture 39 Bluetooth/Wireless Personal Area Networks (WPAN) Dr. Ghalib A. Shah.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Corso di Reti mobili Wi-Fi and Bluetooth Francesco Potortì
Bluetooth Technology Name- Bittu Kumar Roll No.- A05 Section- E2801
SSN College of Engineering
Low power : peak tx power <= 20 dBm
BLUETOOTH THE STANDARD & ISSUES.
Channel Control Interim substates for adding new slaves
A Wireless LAN technologies IEEE
Unit – III Wireless PAN’s
Bluetooth, RFID, Data Link Layer Switching
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
BLUETOOTH (I) Bluetooth technology aims at so-called ad hoc piconets, which are local area networks with a very limited coverage and without the need for.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Bluetooth: Vision, Goals and Architecture
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
Network Architecture for Cyberspace
Networking over Bluetooth: overview and issues
Presentation transcript:

Ad Hoc Nets - MAC layer Part II – TDMA and Polling

More MAC Layer protocols Bluetooth Piconet: a polling/TDMA scheme Cluster TDMA: based on TDMA (with random access and reserved slots) –research protocol developed at UCLA for the DARPA-WAMIS project (1994)

Bluetooth: Where does the name come from?

Bluetooth working group history February 1998: The Bluetooth SIG is formed –promoter company group: Ericsson, IBM, Intel, Nokia, Toshiba May 1998: Public announcement of the Bluetooth SIG July 1999: 1.0A spec (>1,500 pages) is published December 1999: ver. 1.0B is released December 1999: The promoter group increases to 9 –3Com, Lucent, Microsoft, Motorola March 2001: ver. 1.1 is released Aug 2001: There are 2,491+ adopter companies

What does Bluetooth do for you? Synchronization Automatic synchronization of calendars, address books, business cards Push button synchronization Proximity operation

Cordless Headset User benefits Multiple device access Cordless phone benefits Hands free operation Cordless headset

Personal Ad-hoc Networks Cable Replacement Landline Data/Voice Access Points Putting it all together.. …and combinations!

Example...

Bluetooth Physical link Point to point link – master - slave relationship – radios can function as masters or slaves ms s s m s Piconet –Master can connect to 7 slaves –Each piconet has max capacity =1 Mbps –hopping pattern is determined by the master

Connection Setup Inquiry - scan protocol –to learn about the clock offset and device address of other nodes in proximity

Inquiry on time axis Slave1 Slave2 Master Inquiry hopping sequence f1 f2

Piconet formation Master Active Slave Parked Slave Standby Page - scan protocol –to establish links with nodes in proximity

Addressing Bluetooth device address (BD_ADDR) –48 bit IEEE MAC address Active Member address (AM_ADDR) –3 bits active slave address –all zero broadcast address Parked Member address (PM_ADDR) –8 bit parked slave address

Bluetooth Piconet Master Active Slave Parked Slave Standby Page - scan protocol –to establish links with nodes in proximity

Piconet MAC protocol : Polling m s1s1 s2s2 625 sec f1 f2 f3 f hops/sec f5 f6 FH/TDD

Multi slot packets m s1s1 s2s2 625 µsec f1 f4 f5 f6 FH/TDD Data rate depends on type of packet

Physical Link Types m s1s1 s2s2 SCO  Synchronous Connection Oriented (SCO) Link  slot reservation at fixed intervals Asynchronous Connection-less (ACL) Link –Polling access method SCO ACL

Packet Types Control packets Data/voice packets ID* Null Poll FHS DM1 Voice data HV1 HV2 HV3 DV DM1 DM3 DM5 DH1 DH3 DH5

Packet Format 72 bits 54 bits bits Access code Header Payload Data Voice CRC No CRC No retries 625 µs master slave header ARQ FEC (optional)

Access Code Synchronization DC offset compensation Identification Signaling Access code Header Payload 72 bits Purpose  Channel Access Code (CAC)  Device Access Code (DAC)  Inquiry Access Code (IAC) Types X

Packet Header Addressing (3) Packet type (4) Flow control (1) 1-bit ARQ (1) Sequencing (1) HEC (8) Access code Header Payload 54 bits Purpose Encode with 1/3 FEC to get 54 bits Broadcast packets are not ACKed For filtering retransmitted packets 18 bits total s s m s 16 packet types (some unused) Max 7 active slaves Verify header integrity

Voice Packets (HV1, HV2, HV3) Access code Header Payload 72 bits 54 bits 240 bits 30 bytes = 366 bits 10 bytes + 2/3 FEC + 1/3 FEC 20 bytes 30 bytes HV3 HV2 HV1 3.75ms (HV3) 2.5ms (HV2) 1.25ms ( HV1 )

Data rate calculation: DM1 and DH1 Payload Access code Header 72 bits 54 bits 240 bits 30 bytes = 366 bits 2/3 FEC DM DH1 625 µs 1 2 Di r SizeFreqRate  /   

Data rate calculation: DM3 and DH3 Payload Access code Header 72 bits 54 bits 1500 bits 187 bytes = 1626 bits 2/3 FEC DM DH µs Di r SizeFreqRate  /   

Data rate calculation: DM5 and DH5 Payload Access Code Header 72 bits 54 bits 2744 bits 343 bytes = 2870 bits 2/3 FEC DM DH µs 625 µs Di r SizeFreqRate  /   

Data Packet Types DM1 DM3 DM5 DH1 DH3 DH5 2/3 FEC No FEC Symmetric Asymmetric Symmetric Asymmetric

Inter piconet communication Cell phone Cordless headset Cordless headset Cell phone Cordless headset Cell phone mouse

Scatternet

Scatternet, scenario 2 How to schedule presence in two piconets? Forwarding delay ? Missed traffic?

Baseband: Summary TDD, frequency hopping physical layer Device inquiry and paging Two types of links: SCO and ACL links Multiple packet types (multiple data rates with and without FEC) Baseband L2CAP LMP Physical Data link Device 2Device 1

Link Manager Protocol Setup and management of Baseband connections Piconet Management Link Configuration Security LMP RF Baseband Audio Link Manager L2CAP Data Control SDP RFCOMM IP Applications

Piconet Management Attach and detach slaves Master-slave switch Establishing SCO links Handling of low power modes ( Sniff, Hold, Park) req response Paging Master Slave s s m s

Low power mode (hold) Slave Hold duration Hold offset Master

Low power mode (Sniff) Master Slave Sniff period Sniff offset Sniff duration Traffic reduced to periodic sniff slots

Low power mode (Park) Master Slave Beacon interval Beacon instant Power saving + keep more than 7 slaves in a piconet Give up active member address, yet maintain synchronization Communication via broadcast LMP messages

Cluster Network Architecture (UCLA-WAMIS) Concept create a cluster based TDM infrastructure which: (a) enables guaranteed bandwidth for voice/video (b) can support mobility Approach – distributed clustering algorithm – time division slotting within each cluster – slot reservation for real time traffic – virtual circuits for real traffic; datagrams for data – code separation across clusters – slot synchronization Combines cellular radio and traditional packet radio features.

Lowest-ID cluster-head election

Distributed Cluster algorithm (lowest-ID) Each node is assigned a distinct ID. Periodically, the node broadcast the list of nodes that it can hear. – “ClusterHead” hears only nodes with ID higher that itself (unless lower ID specifically gives up its role as CH)  A,B,C – “Gateway” hears two or more CHs  G,H – “Ordinary” node otherwise  Properties –No cluster heads are directly linked. –In a cluster, any two nodes are at most two-hops away, since the CH is directly linked to any other node in the cluster. RE: Emphremides, et al “A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling” Proceedings of IEEE, Vol. 75, No.1, 1987 A B C G H

Cluster network architecture Dynamic, distributed clustering alg. partitions the system into clusters. Code separation among clusters. Local coordination provided within a cluster. Clusterhead acts as local coordinator to –resolve channel scheduling –provide power measurement/control –support virtual circuit setup for real time (voice and video) traffic –maintain synchronization Dynamic adaptation (via periodic updates) –mobility –failures –Interference –bandwidth requirements (B/W alloc.--TDMA slot assgn.)

Channel Access Control Phase: –clustering algorithm –routing –power measurement and control –code and slot assignment –VC setup –acknowledgments Data Phase: –voice/video (PRMA) –data (Random Access) ….. frame data phase control phase fixed TDMA on common code at full power Within each cluster: time-slotted frame

Virtual Circuit support in WAMIS Multimedia Traffic (eg, voice, video): connection oriented; QoS based admission control VC based bandwidth allocation We need: robust, QoS enabled routing “elastic”, reconfigurable VCs

VC reconfiguration in Mobile Environment Conventional VC setup does not work (path breaks up too frequently) Proposed approach: Fast Reservations, like in PRMA (Packet Reservation Multi Access) Packet follow shortest path First packet reserves the slot(s) along the path When path changes, first packet competes again for slots on new path (voice/video rate reduced by low priority pkt drop) If no path, packet is dropped reservation released if slot is unused X new path old path

Case study: compare Random Access and TDMA in Multimedia C. Richard Lin and Mario Gerla Computer Science Department University of California, Los Angeles

CSMA : DARPA PRNET (1970’s) Single channel Spatial reuse CSMA Implicit ACK (echo ACK) Retransmission (for datagrams only) Duct routing (for voice traffic) –Based on Bellman-Ford routing –Alternate routing: multiple paths used to carry multiple copies of a real-time packet to improve reliability –Carrier sense will limit the fan-out

Limitation of PRNET –no bandwidth reservations; no access control (for voice) –“hidden terminal” problem Enter Cluster TDMA (1994) –different codes in each cluster –TDMA type MAC access in each cluster –QoS routing; bdw reservation; access control –Fast VC set up (soft state)

Problems of CLUSTER TDMA: cost and complexity –global slot synchronization –multiple codes –initialization Enter MACA/PR (1996) (Multiple Access Collision Avoidance/Packet Reservations) –no clustering; single code; easy initialization –RTS/CTS dialog (to prevent “hidden terminal” problems) –Packet Reservations (to support real time traffic) –QoS routing; “standby” routs (for dynamic rerouting)

MACA/PR (cont’d)

Real Time Traffic Support: Bandwidth Reservation 1st packet is treated as a datagram packet After 1 st successful transmission: piggyback reservation is honored for subsequent packets Bounded delay and no collision Real -time Traffic and datagram traffic are interleaved (with datagram deferring to real-time traffic)

Performance Comparison (parameters) A 100X100 feet area Number of radio station=20 Frame size =100ms Tx range =40 feet VC end-to-end hop distance=3 Maximum speed=8 feet/sec Data rate=800kbps Pkt size=4kbits; pkt acquisition=500bits Multiple VCs,datagram background traffic Tx rate = 1pkt/frame Call duration=180 seconds.

Performance Comparison of Various Schemes SynchronousAsynchronous Cluster TDMA Cluster Token MACA/PR PRNET Global synchronization Cluster synchronization Session synchronization No synchronization

PRNET – No bandwidth reservation – No acceptance control – In heavy load: duct routing generates excessive number of “requests for alternate routes” ( congestion) MACA/PR – total VC throughput limited by lack of cluster/code separation Cluster TOKEN and TDMA – high end to end delay due to token/TDMA latency Overall Performance Comparison

Channel Propagation Models Radio channel propagation is characterized by three main parameters: Attenuation: free space loss, absorption by foliage, partitions Shadowing: obstacles between transmitter and receiver Multipath: due to the different phases on different paths

Simulator : Glomosim Channel Model Channel Fading Model in Glomosim Simulator the Simulator utilizes the SIRCIM impulse response parameters to characterize the radio propagation model, i.e.: multipath, shadowing effect, spatial correlation

Radio Channel Simulation

VC Performance: free space vs fading model