Download presentation
Presentation is loading. Please wait.
Published byAlexina Carson Modified over 6 years ago
1
July. 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Combining the MAC Definitions with Proposed from CWPAN Std ] Date Submitted: [July, 2008] Source: [ZhenFeng Zhao, Liang Li, Pei Liu ,Paul Dixon, Zhu Lan, D.Y. Wu] Company [Vinno, Huawei, Hisilicon, CESI] Address [Beijing, P.R.China] Voice:[ ], FAX: [ ], Abstract: [] Purpose: [Discussion] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
2
July. 2008 Purpose Combine the Definitions in 15.4E with the proposed MAC modification in CWPAN. The Original Definition is in the black part. The MAC modification in CWAN is added in red part Upgrade the “original (07’)” tech proposals under the new “United” definitions. Try to merge the modification requirement from both of 15.4E and CWPAN. Slide 2 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
3
Definitions GTS Enhancements:
July. 2008 Definitions GTS Enhancements: Extend the existing GTS mechanism in and enhance GTS management and maintenance. Purpose: To address the need for greater control (bounding) of latency, reduce latency, improve delivery reliability for reduced jitter, enable more efficient use of the channel (better payload bits/raw bit rate ratio); Allows a device to share a GTS with other device(s). GTS requirement frame format includes the features of service, and allows the energy-unlimited device utilize INACTIVE period of the superframe by Extending the GTS to INACTIVE period Application Need: Support for latency sensitive content as required in interactive applications; Ability to improve payload/overhead ratio for time critical content; Reduce packet loss as seen by the next higher layer; Scope: Modify existing MAC with additions and enhancements while preserving interoperability with legacy devices (MAC to MAC) and compatibility with the legacy next-higher-layer(s). Slide 3 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
4
Definitions Channel Hopping:
July. 2008 Definitions Channel Hopping: Channel Hopping is a coordinated channel usage scheme. Channel hopping devices in the wireless sensor network are synchronized and select a channel in each synchronized interval (e.g. timeslot) using specified channel hopping sequence. Channels used in the hopping sequence are based on the IEEE C: Channel hopping in the 2.4 GHz band. The IEEE ( C ) physical layer (2.4 GHz, DSSS) includes 16 channels, numbered 11 through 26. Channel hopping provides channel diversity and help maintaining robust and reliable communication links. Channel hopping in the 900MHz and 780MHzband. The IEEE ( C ) physical layer (900 GHz, DSSS) includes 10 Channels and ( 780MHz DSSS) included 4 Channels. Channel hopping provides channel diversity and help maintaining robust and reliable communication links. Slide 4 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
5
Definitions Superframe:
July. 2008 Definitions Superframe: In the beacon-enabled PAN, a superframe structure can be used optionally. The format of the superframe is defined by the coordinator. A superframe must have a beacon frame transmitting in its first slot and can optionally have an active portion and an inactive portion. The beacons are used to synchronize the attached devices, to identify the PAN, and to describe the structure of the superframes. The active portion is divided into equally sized slots and is composed of several parts. Each part contains whole number of consecutive slots and use one certain method to access channel, such as contention, contention-free and any other appropriate methods. Depending on the accessing method, an accessing mechanism is chose, such as CSMA and TDMA. In the inactive portion, the coordinator may enter a low-power (sleep) mode. In the nonbeacon-enabled PAN, a superframe structure is not used. (Reference: Paragraph and in Std ) Slide 5 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
6
Definitions Time Division Multiple Access (TDMA):
July. 2008 Definitions Time Division Multiple Access (TDMA): TDMA is a mechanism for dividing up time and allocating it for use by a connection between two or more devices. Unlike GTS which does this on a fairly coarse scale, TDMA allocations can be defined to be multiples of a much smaller unit of time. Slide 6 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
7
Definitions Quality of Service (QoS):
July. 2008 Definitions Quality of Service (QoS): QoS is a metric of the network’s capability of providing a target service to certain flow utilizing available network resources in the environment of various services coexisting in a PAN and operating in a shared media. The metric may include such parameters as latency, throughput, and reliability of transmission to a certain flow. To achieve the goal, some methods, such as prioritizing and queuing frames, service classification, resource scheduling and data rate control, can be done. Scope: Latency Latency of accessing channel: from receiving a MAC command to transmitting frame successfully (including retries before transmission) Latency of association and re-association Bandwidth - Bulk transfer: data burst during a few seconds (may increase bandwidth according to the requirement) Throughput Reliability Packet loss Reliable reception of broadcast/multicast frame Slide 7 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
8
Definitions Carrier Sense Multiple Access (CSMA):
July. 2008 Definitions Carrier Sense Multiple Access (CSMA): CSMA is the scheme that is essentially one step short of anarchy. Any node may send a message during the Contention Access Period where CSMA rules apply. Under such conditions, the potential for conflict and wasted air time is great. Various schemes are imposed to minimise harmful collision. These include Carrier Sense to ensure that no node attempts to start a transmission while there is another transmission in progress. There are ransom back off schemes to minimise the probability that two nodes will begin their transmissions at exactly the same time. The optimum range for this random back off time is dependent on the number of competing nodes. The efficiency of a system can be enhanced by the use of adaptive schemes which iteratively attempt to estimate the number of competitors and adjust the range of their backoff periods depending on this figure to achieve a more optimal performance and higher efficiency and throughput. Modify the present CSMA/CA procedure a Non-persistent CSMA/CA is suggested to provide an enhanced CAP performance with lower complexity), and a Distributed Contention Access scheme is adopted to improve the performance of throughput. Slide 8 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
9
Definitions Reliability:
July. 2008 Definitions Reliability: In many industrial systems, it is indispensable to provide high reliability to end users. We can define the reliability with five aspects: Fault detection - When a fault occurs, it first detects the fault. This is called fault localization. Fault diagnosis - After localizing the fault, it diagnoses the localized parts such as nodes or links in the system. Fault recovery - Then it executes a recovery procedure according to a pre-defined system service. As a result, it removes the fault from the system and may change it to degenerated mode. Fault analysis - Even though the system goes back to normal status, the system integrator has a responsibility to explain the causes of system-fault and its proposal for relapse prevention. Reproduce of the fault - If it can not remove the faults, the system integrator is required to reproduce the faults at another backup system. In general, fault management is handled by applications or network management systems. However, current fault management mechanisms are not sufficient to apply the wireless system to industrial systems. In this TG, fault detection and fault recovery which are related with MAC specification are mainly discussed. Slide 9 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
10
Definitions Security: There are two major aspects to Security:
July. 2008 Definitions Security: There are two major aspects to Security: control who may join a network Admission control requires some enhancement to meet the needs of managed systems in the Smart Grid utility world. ensure that transmissions may not be understood by eavesdroppers. Encryption is used to achieve the second of these requirements, existing schemes under evaluation by the communications standards are adequate for this purpose Yet such schemes are probably too complex for many home installations. It is probable that a number of levels of security need to be offered, ranging from: little or no admission control, minimizing the window of opportunity by push button admission to fully encrypted authorization. Fully encrypted admission control will be required for utility based Smart Grid applications, where the scheme will entail each node, as well as having a MAC address, having a private encryption key. The key for any authorized node will be known by the utility admission controller and request for admission will be sent encrypted with that key in order that the admission controller can have confidence the MAC address is not being spoofed. Discussion: should authentication be added to this definition? this definition will be discussed on reflector before next call Slide 10 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
11
Definitions PHY support:
July. 2008 Definitions PHY support: Adding support to improve the PHY performance in terms of QoS, coexistence and overall system energy consumption by enhanced control of PHY related parameters using control from the MAC via existing PIBs or additional (new) PIBs when needed. The added support may include provision for Antenna Diversity, CCA, CSMA, Frequency Hopping / AFA (Adaptive Frequency Agility). On the other way, the MAC enhancement should support the new PHY layer modification (such as at 780 MHz and 950 Mhz) Slide 11 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
12
Definitions Manage/Support:
July. 2008 Definitions Manage/Support: Additions to the MAC to better support network forming, configuring and maintenance, manage device configuration and options; Purpose: Support the control of all the nifty new features we are adding as part of 4e; Support NHL applications for better (automatic) control and maintenance of the node and network; Application Need: Reduce latency involved with network forming such as device association and re-association; Provide better support for upper-layer network management needs, such as mesh forming and maintaining; Provide better visibility and control of QoS and MAC performance; Scope: While preserving interoperability with legacy devices, NMS enhancements include: Additional MLME service definitions, New MAC management frames, New and/or enhanced Superframe structure; Mechanisms to control QoS parameters which are being enabled; Mechanisms used to identification of node capabilities; Additional MAC functions for assessment of performance monitoring Slide 12 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
13
Definitions Backward Compatibility:
July. 2008 Definitions Backward Compatibility: In [section 5.1] “backward-compatible” is defined as: “in other words, devices conforming to this standard are capable of joining and functioning in a PAN composed of devices conforming to IEEE Std ”. This implies the capability to interoperate, in some mode of operation. It does not mandate networks using new and optional behaviors to allow older devices or those without the optional behavior to join. For this discussion we define the term “Backwards Compatibility” to mean that there is a mechanism for existing compliant devices to join networks or exchange data with devices that have newer/optional behavior. Slide 13 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
14
July. 2008 Definitions Coexistence: the ability of one system to perform a task in a given environment where there are other systems that may or may not be using a similar set of rules Interoperability: The ability of two systems to perform a given task using a single set of rules, The ability of two or more systems or elements to exchange information and to use the information that has been exchanged (ATLAS/C/PA/SCC20) Modeling: creation of a tool that yields an approximation of real life parameter Simulation: The ability of a computer program to accurately predict the behavior of protocols, etc Slide 14 ZhenFeng, Liang, Pei, Paul ,Z.F and Lan
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.