University of L Aquila. Scheduling for wireless control in single hop WirelessHART networks

Size: px
Start display at page:

Download "University of L Aquila. Scheduling for wireless control in single hop WirelessHART networks"

Transcription

1 University of L Aquila Faculty of Engineering Master s Degree in Electronics Engineering Scheduling for wireless control in single hop WirelessHART networks Supervisors: Authors: M.D. Di Benedetto Valeria Ercoli Alf Isaksson Identification Number: Karl Henrik Johansson A.A. 2009/2010

2 University of L Aquila Faculty of Engineering Master s Degree in Electronics Engineering Scheduling for wireless control in single hop WirelessHART networks Supervisors: Authors: M.D. Di Benedetto Valeria Ercoli Alf Isaksson Identification Number: Karl Henrik Johansson A.A. 2009/2010

3 To my Dad

4 Acknowledgement I would like to thank some of the people who made this work possible, feasible and pleasurable. A special gratitude to Alf Isaksson, my supervisor at ABB, for his kindness, patience, motivation, enthusiasm, and immense knowledge. I would like to express my thanks to Karl Henrik Johansson, my supervisor at KTH, for his detailed review and constructive comments, and for having involved me in this interesting project. I wish to express my warm and sincere thanks to my home university supervisor Maria Domenica Di Benedetto. I will always be greatly indebted to her for providing me with the stimulating opportunity to make my master thesis in Sweden. I am especially grateful to Dr.Alessandro D Innocenzo for his constant support and encouragement during these years. Finally, I would like to thank my family and friends for giving me happiness and joy during my difficult moments. ii

5 Abstract Key words : Automatic process control, WirelessHART, controlled variables, controller, fieldbus, network reliability, performance analysis, PID control, process automation, scheduling algorithms. iii

6 Contents 1 Introduction Outline of the thesis Chapter 2:WirelessHART Chapter 3:Scheduling Theory Chapter 4:Automation System 800xA Chapter 5:Process Control Chapter 6:Scheduling of Wireless Control Chapter 7:Conclusions and future work WirelessHART Introduction Wireless Standard for Industrial Automation WirelessHART Standard TDMA Data Link Layer WirelessHART Gateway WirelessHART Network Manager WirelessHART Network Schedule Schedule Strategy Communication Tables Graph Routing Scheduling Theory Introduction Scheduling Algorithms On-line scheduling Off-line scheduling i

7 CONTENTS 4 Automation System 800xA Introduction AC800M Controller Evolution of Control Technology Clock synchronization Fieldbus Standards S800 I/O S800 I/O Station Data Scanning Process Control Introduction PID Control Proportional Action Integral Action Derivative Action Cascade Control Mid-Range Control Split-Range Control Ratio Control Scheduling of Wireless Control Introduction Scheduling problem statement Superframes setting Communication and control superframe schedule Formalization of the scheduling problem Scheduling policy Scenario I Scenario II Shared Slots Boliden Example Conclusions and future works 66 A Boliden Control Variables 68 ii

8 CONTENTS Bibliography 71 iii

9 List of Figures 2.1 WirelessHART network components Slot timing Communication tables Network topologies xA system network architecture S800 I/O station overview S800 I/O Dynamic Data Exchange Industrial network topology [13] PID controller Example of a generic control loop Set of control loops Example I Superframes Example I Set of control loops Example I Superframes Example I Set of control loops Example I Superframes Example I Set of control loops Example II Precedence graph Example II Superframes Example II Set of control loops Example II Precedence graph Example II Superframes Example II Set of control loops Example Shared Slots Superframes Example Shared Slots iv

10 LIST OF FIGURES 6.18 Diagram of froth flotation cell Zinc flotation circuit [24] v

11 List of Tables A.1 Controlled variables for the Garpenberg plant A.2 Garpenberg plant: variables to be scheduled in shared slots vi

12 Chapter 1 Introduction This thesis is part of the SOCRADES project, a European research and advanced development project with the primary objective to create new methodologies, technologies and tools for the modeling, design, implementation and operation of networked control systems embedded in smart physical objects. These systems are becoming more important in the new-generation industrial automation field thanks to the many advantages introduced by the networks. In fact, the use of a network to connect the devices permits to eliminate unnecessary wirings, reducing the complexity and the overall cost in designing and implementing the control systems. In the last years the fast spread of the wireless technologies has opened new scenarios for the communication in the automation field. The benefits introduced by the use of wireless communication in the networked control system are many,first of all the gain in productivity and flexibility,and of course the simplicity and the convenience of the sensors placement. Wireless industrial communications based on WLAN and IEEE standards are in the focus of this kind of research and development. In particular, wireless sensor/actuator networks (WSN) are to be closely investigated, as they will definitely foster the mobility and flexibility required in industrial communication. The natural features of wireless technologies enable greater opportunities for reconfiguration/upgrading, maintenance and fault tolerance. An industrial application, as the one considered in this work, will frequently require hard bounds on the maximum delay allowed. In particular, as the sensors and actuators are part of closed loop control systems, strict timing requirements apply, ensuring a short response time and an efficient use of the available radio bandwidth. Thus, algorithms and software that are capable of dealing with hard and soft time constraints are very important in control implementation 1

13 1.1. Outline of the thesis and design, and areas such as real-time systems from computer science are becoming increasingly important also in control theory. This combined with the trend of having more functionality being realized in software, make resource scheduling and its effect on control performance a relevant issue. This work is focused on the study of the problem of finding a good scheduling algorithm in order to manage the exchange of information between sensors/actuators and the gateway and between the gateway and the controller in a WirelessHART networked control system. WirelessHART is a wireless protocol that provides a low cost, relatively low speed (e.g., compared to IEEE g) wireless connection. The WirelessHART standard does not give any specification concerning about a particular scheduling algorithm to be used in a WirelessHART network. However, in this Standard there are some requirements to be taken into account. The scheduling theory has been deeply explored in the academic literature and has progressed in recent years due to the strict requirements of real-time systems such as predictability and timing constraints. However, extending this scheduling theory in practice is not so easy cause these theoretical approaches to schedule do not fit well with a real environment in which the notion of task is often completely different from the one defined in theoretical algorithms. In these cases the implementation of a new scheduling algorithm is required. In this thesis a heuristic, off-line algorithm, priority based is proposed and described in deep with some meaningful examples. The suggested scheduling policy has been applied to two different ideal scenarios. The last part of the thesis deals with a level control problem in a mineral flotation plant and with the possibility to use a wirelesshart network for that plant.the proposed algorithm is applied also to this industrial environment and it is proved to be a good solution to meet the feasibility-delay tradeoff. Some relevant considerations and conclusions follows. 1.1 Outline of the thesis Chapter 2:WirelessHART In this chapter the WirelessHART protocol will be described. The first two sections give a general introduction to the protocol with the main information and the technical characteristics of WirelessHART. In the third section a more exhaustive description of the communication protocol is given: the structure of the MAC protocol (Medium Access 2

14 1.1. Outline of the thesis Control),the devices and the network resources specification and in particular scheduling and routing are deeply explained Chapter 3:Scheduling Theory This chapter is an overview of the basic scheduling algorithms of the academic literature suitable for sensor networks. Both on-line and offline algorithms are analyzed Chapter 4:Automation System 800xA In this chapter the industrial IT System 800XA process automation system is described.in particular AC800M controller is presented since it is the most current controller series used within all of the ABB and it provides modern communication features Chapter 5:Process Control This chapter will deal with components required to build complex automation systems using the bottom up approach. The key component is the PID controller and it will be described in Section 5.2. Other important control principles such as cascade control, mid-range control, split-range control and ratio control will be discussed, respectively, in Sections 5.3, 5.4, 5.5, Chapter 6:Scheduling of Wireless Control In this chapter is presented the proposed scheduling algorithm.the performance of the algorithm are evaluated from the viewpoint of the feasibility and delay by simulation on several ideal scenarios.the proposed approach is applied also to a real industrial environment that is Garpenberg mineral flotation plant Chapter 7:Conclusions and future work The work concludes with a statement of future work. 3

15 Chapter 2 WirelessHART 2.1 Introduction NOTE: IN THIS CHAPTER Wireless Standard for Industrial Automation Wireless technologies give several advantages to industrial automation in terms of gain in productivity and flexibility. Industrial sites are often harsh environments with stringent requirements on the type and quality of cabling. Moreover they can easily require many thousands of cables and it could be difficult to engineer additional wires in an already congested site. Thus wireless communication can save costs and time. At the same time it improves reliability with respect to wired solutions by means of several mechanisms of diversity, such as space diversity, frequency diversity and time diversity. Furthermore the ad-hoc nature of wireless networks allows for easy setup and re-configuration when the network grows in size. Moreover where sensors and actuators are mounted on moving parts, hard-wiring requires complex mechanical solutions that are costly and may limit the freedom of movement of the part and present a potential cause of failure. As sensors and actuators are part of closed-loop control systems, an industrial application will require hard bounds on the maximum delay allowed during the communication, so strict timing requirements apply. Another requirement is the coexistence of the network with other equipment and competing wireless systems. The WirelessHART standard has been released to fulfill all these demands. 4

16 2.3. WirelessHART Standard 2.3 WirelessHART Standard WirelessHART is a wireless mesh network communication protocol for process automation applications, including process measurement, control, and asset management applications. It is based on the HART protocol, but it adds wireless capabilities to it enabling users to gain the benefits of wireless technology while maintaining compatibility with existing HART devices, tools and commands. Each WirelessHART network includes three main elements: Field Devices that are connected to and characterize or control the Process or Plant Equipment. All network devices, including field devices, must be capable of routing packets on behalf of other devices. A Gateway which connects the WirelessHART network to a plant automation network, allowing data to flow between the two networks. It enables communication between Host Applications and field devices that are members of the WirelessHART network. Every WirelessHART network includes one Gateway that, in turn, has one or more network access points. They can be used to improve the effective throughput and reliability of the network, as more packets per second through the network are possible and the network is resistant to the failure of a single access point. It is important to notice that a network access point is not directly connected to the process, it is part of the Gateway. A Network Manager that is responsible for configuration of the network, scheduling communication between network devices, management of the routing tables and monitoring the health of the WirelessHART network. While redundant Network Managers are supported by the standard, there must be only one active Network Manager per WirelessHART network. In the diagram in Figure 2.1 the WirelessHART network is connected to the plant automation network through a gateway. The plant automation network could be a TCP-based network, a remote I/O system, or a bus such as PROFIBUS. The gateway is connected to the WirelessHART network through network access points that increase the throughput and improve the overall reliability of the network. All network devices such as field devices and access points transmit and receive WirelessHART packets and perform the basic functions necessary to support network formation and maintenance. 5

17 2.3. WirelessHART Standard Figure 2.1: WirelessHART network components. Devices can be deployed in a star topology, that is all devices are one hop to the gateway, to support a high performance application, a multi-hop mesh topology for a less demanding application, or any topology in between. These possibilities give flexibility to WirelessHART technology enabling various applications (both high and low performance) to operate in the same network. WirelessHART specifies the use of IEEE STD compatible transceivers operating in the 2.4 GHz ISM (Industrial, Scientific, and Medical) radio band. The radios employ DSSS (Direct Sequence Spread Spectrum) technology and channel hopping to guarantee security and reliability. Communications among network devices are arbitrated using TDMA (Time Division Multiple Access) that allows to schedule link activity TDMA Data Link Layer WirelessHART uses TDMA and channel hopping to control access to the network and to coordinate communications between network devices. The basic unity of measure is a time slot which is a unit of fixed time duration commonly shared by all network devices in a network. The duration of a time slot is sufficient to send or receive one packet per channel and an accompanying acknowledgement, including guard-band times for network wide-synchronization. The WirelessHART standard specifies that the duration of the time slot is equal to 10 ms. The TDMA Data Link Layer establishes links specifying the time slot and frequency where 6

18 2.3. WirelessHART Standard communication between devices occurs. These links are organized into superframes that periodically repeat to support cyclic and acyclic communication traffic. All devices must support multiple superframes: different superframes may have lengths that differ from each other and additional superframes can be enabled or disabled according to bandwidth demand. Slot size and the superframe length (in terms of number of time slots) are fixed and form a network cycle with a fixed repetition rate. However, a superframe is fixed while it is active but its length can be modified when inactive. Links may be dedicated or shared. Only two devices are assigned to a given dedicated slot, one being the source and the other being the destination. A communication transaction within the slot supports the transmission of a DLPDU (Data-Link Protocol Data Unit) from the source followed right away by the transmission of an acknowledgment by the addressed device. Otherwise links may be shared between multiple sources, using contention-based access as collisions may occur within a shared slots when more than one source try to convey a packet within the same slot and channel. If a collision occurs, the destination device will not be able to successfully receive any source s transmission and will not produce acknowledgement to any of them. To reduce the probability of repeated collisions, source devices shall use random back-off delay when their transmission in a shared slot is not acknowledged. Shared slots are allocated to provide base bandwidth and elastic bandwidth utilization while minimizing power consumption. For TDMA communications to be successful and efficient, all transactions have to occur in slots following specific timing requirements thus synchronization of clocks between devices in the network is critical. In particular, the network devices must have the same notion of when each time slot begins and ends, with minimal variation. Figure 2.2: Slot timing. In this way, transmission of the source message can start at a specified time after the 7

19 2.3. WirelessHART Standard beginning of the slot, allowing the source and the destination to set their frequency channel and enabling the receiver to begin listening on the specified channel. It must start to listen before the ideal transmission start time and continue listening after that ideal time due to a tolerance on clocks. Once the transmission is complete, the communication direction is reversed and the destination device indicates whether it received the source s DLPDU successfully or with a specific class of detected errors, by transmitting an acknowledgement (see Figure 2.2). To enhance reliability, channel hopping is combined with TDMA. It is a mechanism of frequency diversity that allows to reduce interference from other sources and multi-path fading effects. At the same time channel hopping provides channel diversity, that is each slot may be used on multiple channels at the same time by different nodes. NOTE: TIME KEEPING (DATA LINK LAYER) WirelessHART Gateway The WirelessHART Gateway is functionally divided into a Virtual Gateway providing a sink or source point for the network traffic and one or more Access Points that provide the physical connection into the WirelessHART network. If the gateway is made up of more than one access point, the Network Manager will schedule communication traffic through all of them. The Gateway must provide the time synchronization messages to other network devices, so the clock information ripples downward from the top of the network hierarchy to the bottom, that is from the gateway to field devices. The virtual gateway communicates to any field devices through network access points, so it must have a path to every device in the network. On the other hand it can communicate directly with the Network Manager, but this is an external connection. The network manager and the gateway must establish a secure communication channel with each other, and maintain this connection to carry control and data traffic. The gateway can connect with the host application via various protocols (e.g. Modbus, PROFIBUS) based on different physical layers. The network access points communicate with the virtual gateway via a dedicated link or communication port. Moreover, each access point can support communication with any device to which the network manager has provided a path. As not utilizing every slot represents wasted opportunities, an access point should have activity (e.g. transmit or receive) scheduled for every slot. Thus, if the 8

20 2.3. WirelessHART Standard access points have nothing else to do they should advertise and perform shared listens. It is important to notice that all communications with the WirelessHART network pass through the gateway which must route packets to the specified destination (network device, host application or network manager) WirelessHART Network Manager The Network Manager is central to the overall operation of the WirelessHART network. It is responsible for the management, scheduling, monitoring, and optimization of communication resources of the WirelessHART network. It manages both the WirelessHART network and the network devices. To perform its complete set of functions it needs configuration and setup information about the network devices that it reads from the devices themselves, information about how the network is going to be used, and feedback from the network about its overall health. There is one network manager per WirelessHART network, and it may be co-located with the Gateway in the same box or located in a completely separate physical box. It is an application rather than a network device, so its location is not restricted by the WirelessHART specification. However, the network manager must have a secure communication channel to the gateway. The network manager forms the WirelessHART network and establishes routes, initializing and maintaining network communication parameter values. It provides mechanism for devices joining and leaving the network. It is also responsible for managing dedicated and shared network resources, and for allocating communication resources. The allocation of communication resources is referred to as scheduling. The network manager establishes paths between the gateway and the network devices, but after that it is not involved in communications between host applications and network devices. The gateway is responsible for comparing the destination address of packets with its own address and the network manager s address. Whenever the gateway receives packets destined for the network manager, it may remove the packet from the wireless network and forward them to the network manager using its secure connection. Packets with other destinations, as well as packets received from the network manager, are routed into the network according to the routing described in the packet. To generate the scheduling, the network manager combines information it has about the topology of the network, heuristics about communication requirements, and requests for 9

21 2.3. WirelessHART Standard communication resources from network devices and applications. In particular, in order to schedule communication resources between network devices, the network manager must know the update rate of each device. As part of its system functions, the network manager collects network performance and diagnostics about the behavior of the overall network. This information is available to be reported to host-based applications but it is also used to adapt the network to changing conditions. The adaptation includes updating route and schedule information, in order to improve operation of the network while conserving power within devices. Reconfiguration of the network may be performed while the network is operating as diagnostics are accessible during run-time WirelessHART Network Schedule A key characteristic of a WirelessHART network is the ability to automatically start up and self-organize. However, before a WirelessHART network can form, a network manager and a gateway must exist and they must have created a private connection with each other. To initialize the network, the network manager must create the network management superframe and the network graph that is an optimized route map. NOTE: NETWORK MANAGEMENT SUPERFRAME Management superframe has priority over data superframes and, following the WirelessHART specifications, the network management superframe should be 6400 slots. When the network manager creates the initial superframe, it assigns links in it for the gateway s access points and configures the gateway. It also assigns a dedicated superframe to the gateway (the gateway superframe), in order to schedule activity of management of the network which access points have to perform (such as listening of the channels to search for new devices needing to join the network). Activating this first superframe the network manager establishes the ASN (Absolute Slot Number, it indicates the actual time that is being used for transmission of a specific packet) 0. The time when the network manager starts the WirelessHART network is said to be the epoch for a specific network. The network manager is also responsible to generate and to manage the network schedule. In order to do so, it needs information about the network, the communication requirements, and the capabilities of the network devices. Using this information the network manager is able to adjust the schedule to meet the requirements, and then to tune it by using the feedback from the operation of the system. 10

22 2.3. WirelessHART Standard The network manager allocates communication resources in terms of superframes and links. A link is the full communication specification between adjacent devices in the network, that is the communication parameters necessary to move a packet one hop. Each link includes one time slot, a channel offset (for the frequency hopping), its type (transmit, receive or shared), neighbor information, and transmit/receive attributes. Links are assigned to superframes as part of the scheduling process. The superframe is a set of slots repeating at a constant rate, these slots are called relative slots, meaning that they are relative to the start of the superframe instead of being referred to the epoch of the network. A frameid is assigned to each superframe. The superframe size, i.e. the number of slots in the superframe, is the period of that superframe, that is how often each slot repeats. In particular, the data superframe length is determined by data scan rate. Time slots are assigned to devices through links. For a dedicated link there will be a send slot in one device and a receive slot in another device. If the link is shared then there will be a receive slot in one device and one or more transmit slots in several devices, in other words, shared links can have more than one talker and only one listener. When a device has a shared link, it uses a collision-avoidance scheme with a backoff/retry mechanism to handle collisions that may occur. Using shared links may be suitable when throughput requirements of devices are low, or when the traffic rate is irregular. In these situations, assigning shared links may decrease latency because the network device does not need to wait for dedicated links, but this is true only when chances of collisions are low. The network manager creates a set of links for each device, it determines when the device s transceiver needs to wake up, and when it wakes up whether it should transmit or receive. However the link does not determine what is communicated, it is only providing the opportunity to communicate. A link assignment specifies how the network device shall use a time slot. When a time slot is assigned to a device, the device can perform different actions within that time slot, depending on the type of the associated link: it can attempt to transmit a packet, wait to receive a packet, or remain idle. All devices support multiple superframes of different sizes. All superframes logically start in the same place in time: cycle 0, slot 0 of every superframe occurs at the beginning of the epoch. Thus, time slots in different superframes are always aligned, even though beginnings and ends of superframes may not be. Multiple superframes can be used to 11

23 2.3. WirelessHART Standard define a different communication schedule for various sets of devices or to allow the entire network to run at different communication rates. In fact, by configuring a network device to participate in multiple overlapping superframes of different sizes, it is possible to establish different communication schedules and connectivity matrices that all work at the same time. But a network device with links in multiple superframes may encounter a link arbitration situation. This may happen when two or more superframes with assigned links coincide in the same absolute time slot. In these cases, the device must operate on the link that has the numerically lowest frameid. For this reason, the gateway superframe should be allocated with a large ID value. It is also required to be 40 slots long, this means that the gateway superframe needs to be a minimum of 400 ms. Additional superframes may also be allocated for event notifications or HART commands issued through host applications. It is important to notice that superframes can be added, removed, activated, and deactivated by the network manager while the network is running Schedule Strategy WirelessHART standard does not give any specification concerning about a particular scheduling algorithm to be used in a WirelessHART network. However, there are some references to be taken into account. First of all, for all network devices accessed through the gateway, the user has to configure how often each measurement value is to be communicated to the gateway. In order to support multiple superframes for the transfer of process measurements at different rates, the size of superframes should follow a harmonic chain in the sense that all periods should divide into each other, in particular, scan rates should be configured as integer multiples of the fastest update time that will be supported by network devices. For this reason, the supported update rates will be defined as 2 n where n is positive or negative integer values, for example scan rate selections of 250 ms, 500 ms, 1 s, 2 s, 4 s, 8 s, 16 s, 32 s (or more). The scheduling of communications associated with process measurements can be simplified by defining a superframe for each scan period and developing the schedule by allocating slots for transmission of measurement data starting with the fastest to the slowest scan rate. To avoid any conflict between the slots reserved for process measurement and network management, the length of the network management superframes may be configured to be an integer multiple of the fastest scan rate and configured to use slots that are not required for process measurement transmission. In this manner, slots may be allocated 12

24 2.3. WirelessHART Standard for the transmission of measurement without any conflict with the slots dedicated for management communications Communication Tables Each network device (including field devices) contains tables controlling communication activities and packet buffers, which are used to receive, process and forward packets. The communication tables and the relationships between them are shown in Figure 2.3. Figure 2.3: Communication tables. The Superframe Table contains the identifier of the superframe, the number of slots in the superframe, a flag indicating if the superframe is currently activated and a list of links. The Link Table, in turn, contains a reference to a neighbor which is allowed to communicate with the device, indicating the type of the link, the slot number in the superframe, the frequency hopping channel offset and a flag indicating if the link may be used for receive or for transmit. The Neighbor Table has a primary importance in the management of device communications. It is a list of all neighbors of the device, which are all devices that the device can directly exchange messages with. The neighbor table includes all the properties and the statistics pertaining to the neighbor of the device, such as basic neighbor identity information, performance and historical statistics and shared slots parameters. The Graph Table maintains the identifier of the graph, optionally the destination address and a reference to one or more neighbors. When a graph is used for routing, the list of neighbors held by the graph table identify those devices that are legal destinations for the packet s next hop toward its final destination. For more details about graphs and routing see the next subsection. 13

25 2.3. WirelessHART Standard Graph Routing WirelessHART networks can be configured in various topologies in order to support several applications such as: star network, in which there is just one router device (the gateway) that communicates with several field devices. It is suitable for a small application; mesh network, in which all network devices (including field devices) are router devices. A mesh network is a robust network with redundant data paths which is able to adapt to changing environments and more widespread applications. star-mesh network, that is a combination of the star network and the mesh one. Figure 2.4: Network topologies. In a star network all network devices are connected to the gateway through a single hop, while mesh networks are multi-hop networks, that is, they use two or more wireless hops to convey information from a source to a destination, thus requiring a routing algorithm in order to allow the communication between network devices. WirelessHART documentation does not specify a routing algorithm, it only describes two methods of routing packets in a WirelessHART network: source routing and graph routing. All devices must support both of them. Source routing specifies a single directed route in terms of devices and links, between a source node and a destination node. The source route is statically specified in the packet itself, that contains the list of devices addresses composing the path toward the destination, thus intermediate devices require no knowledge of the source route in advance. However if one of the intermediate link fails the packet is lost, for this reason source routing should only be used for testing routes, troubleshooting network paths or for ad-hoc communication. On the contrary, in graph routing the graph route is a directed list of paths (subsets of directed links and devices) that connect two devices within the network that need to 14

26 2.3. WirelessHART Standard communicate, allowing to have redundant communication between network endpoints. All intermediate devices must be pre-configured with graph information that specifies the neighbors to which the packet may be forwarded. The network manager is responsible to setup and manage all routes and to configure graph information in each network device. In order to create efficient and optimized routes the network manager needs information about the network, communication requirements and the capabilities of network devices. Hence, when devices are initially added to the network, the network manager stores all neighbors entries including signal strength information as reported from each network device. Then it uses this information to build a complete network graph which is an optimized route map, in the sense that possible but suboptimal links have been removed. In particular, the network graph is optimized in terms of reliability, hop count, reporting rates, power usage and overall traffic load. As the overall network adapts to changing information, the network manager updates the topology, adding or deleting information in each network device. The network manager contains the network graph and portions of the graph that have been installed into each device. Once the routing information and communication requirements for each device are known, the scheduling of network resources can be performed for both scheduled upstream and downstream communications. Graphs are unidirectional, thus there are upstream paths which are used from field devices to the gateway, for example for transferring process measurements and alarms, and downstream routes that provide paths from the gateway to field devices, to send control information, such as setpoint changes for actuators. According to WirelessHART routing requirements, in a properly configured network, all devices will have at least two devices in the graph through which they may send packets, each graph should use a maximum of 4 neighbors as a potential next hop destination, the minimum number of hops to be considered when constructing the graph is 2, the maximum one is 4 and, if there is a one hop path to the gateway it should be used. Every graph in the network is associated with a unique GraphID, a list of neighbors and the destination s address, but this one is an optional field since intermediate devices may be merely forwarding the packet along the route path according to the GraphID. To send a packet on a graph, the source device include a GraphID in the packet s network header. NEED TO INSERT NPDU STRUCTURE? 15

27 2.3. WirelessHART Standard In addition to the communication tables mentioned above (see Subsection 2.3.6), in order to be able to route packets along a graph, a device needs also to be configured with a connection table containing entries that include the GraphID and neighbor address. The device routing that packet must perform a lookup in the connection table by GraphID, and send the packet to any of the neighbors associated with that packet s GraphID. Once any neighbor acknowledges receipt of the packet, the routing device may release it and remove the packet from its transmit buffer. If an acknowledge is not received, the device will attempt to retransmit the packet at its next available opportunity. This means that, when a field device does not communicate directly with the gateway, then added communication slots must be reserved in the schedule for packet routing. 16

28 Chapter 3 Scheduling Theory 3.1 Introduction A real-time system is a system in which the correctness of the system behavior depends not only on the logical results of the computations, but also on the physical instant at which these results are produced, in other words, it is a system with explicit deterministic (or probabilistic) timing requirements. Real time systems can be viewed as an important subclass of embedded systems. These are most often subject to limited computation resources as a result of economic considerations. This combined with the trend of having more functionality being realized in software, make resource scheduling and its effect on control performance a relevant issue. A key issue in real-time systems is predictability, i.e. to be able to anticipate the behavior of the system before run-time, and the guarantee that the system will behave as anticipated at run-time. At the same time, run-time flexibility is a desired feature, as not all run-time events can be completely taken into account in advance. In addition, the choice of scheduling strategy in real-time systems is strongly related to the nature of the timing constraints which have to be fulfilled. As different scheduling schemes provide different levels of, for example, predictability or flexibility, there is usually a trade-off between the ability to handle complex constraints and the level of flexibility provided by the selected scheduling strategy. NOTE: IN THIS CHAPTER... 17

29 3.2. Scheduling Algorithms 3.2 Scheduling Algorithms Real-time scheduling theory offers a way of predicting the timing behavior of complex multi-tasking computer software, assuming that a real-time system consists of the following components: a set of computational and communication tasks {τ 1, τ 2,..., τ n } to be performed fulfilling a number of timing requirements, where a task τ i is a sequence of jobs or operations {J i,1, J i,2,..., J i,ki } for i = 1,..., n; a run-time scheduler (or dispatcher) that controls which task is executing at any given moment; a set of resources shared by the set of tasks. All communication and synchronization between tasks are assumed to occur via shared resources. Each job has a release time and a computation time. The release time is the time in which the job becomes available for processing that requires a computation time c. For a task the deadline is the time interval within which all task s jobs must finish executing and it is specified relative to the arrival time of the task invocation, thus defining also the corresponding absolute deadline. The purpose of the deadline is to constrain the acceptable finishing time for a task. The task characteristics can be specified by a set β made up of 4 elements {β 1, β 2, β 3, β 4 }. β 1 describes precedence relations between jobs, that are represented by means of an acyclic directed graph G = (V, E) where V is the set of jobs and, i, j = 1,..., n, x = 1,..., k i, y = 1,..., k j, (ix, jy) E iff J i,x must be completed before J j,y starts (notice that the involved jobs can belong to the same task or to different tasks). INSERT FIGURE AND REFERENCES If there are dependencies between jobs β 1 = prec. If β 2 = r i, then release dates may be specified for each task. If r i = 0 for all tasks, then β 2 does not appear in β. β 3 specifies restrictions on the computation time for each job of a task. If β 3 is equal to c i,ki = 1 then each job has a unit processing requirement. If β 4 = d i,ki then a deadline is specified for the job J i,ki belonging to the task τ i. This means that the job J i,ki must finish within the time interval d i. Given an arbitrary set of tasks, the corresponding scheduling problem is to find a schedule of these tasks satisfying certain restrictions and optimizing one or more performance measures. A schedule is said to be feasible if the temporal constraints of tasks are met at run-time (e.g. if all tasks are executed within a certain time interval). 18

30 3.2. Scheduling Algorithms A task is periodic if it is time-driven, with a regular release (invocations are all identical and arrive at fixed time instants). The time interval between two successive invocations of the task τ i is a constant T i, and it is called the period of the task. If the relative deadline for a periodic task is left unstated it is usually assumed to be equal to the task s period. A task is aperiodic if it is not periodic, it consists of a sequence of invocations which arrive randomly, usually in response to some external triggering event, thus it is eventdriven. Sporadic tasks are a special case of aperiodic ones but they have a fixed minimum inter-arrival time. Task invocations may be further categorized by their availability to be preempted while executing. Following these classifications, tasks can be non-preemptive, if task invocations execute to completion without interruption once started, or they can be preemptive if task invocations can be temporarily preempted during their execution by the arrival of a higher-priority invocation. In scheduling theory the notion of priority is commonly used to order access to shared resources such as processors or communication channels. Scheduling algorithms can also be divided in two big classes: off-line or static algorithms and on-line or dynamic algorithms On-line scheduling On-line scheduling algorithms are suitable for event-triggered systems as they provide the capability to handle dynamic on-line events. They require a complex scheduler that has to make decisions about which task to execute at run time, based on the priorities of the task invocations. As it is a priority-based approach, this scheduling policy can be further categorized with respect to the priority, thus determining fixed-priority algorithms and dynamic-priority algorithms. In fixed-priority algorithms the dispatcher statically associates a priority with each task in advance. Two basic priority assignment rules are the Rate Monotonic (RM) algorithm and the Deadline Monotonic (DM) scheduling. According to RM, tasks are assigned fixed priorities ordered as the rates, so the task with the smallest period receives the highest priority. Instead, in DM tasks with shorter deadlines are allocated higher priorities. In dynamicpriority scheduling the priority of each task is determined at run-time. Typically this requires a more complex run-time scheduler than fixed-priority scheduling. One of the most used algorithms belonging to this class is the Earliest Deadline First (EDF) algorithm, according to which task priorities are inversely proportional to the absolute deadlines. Considering a physical plant interacting with a controller that measures some plant signals 19

31 3.2. Scheduling Algorithms and generates appropriate control signals in order to influence the behavior of the plant, another approach is to combine scheduling theory and control theory to achieve higher resource utilization and better control performance. In this case, the on-line scheduler uses feedback to dynamically adjust the control task attributes in order to optimize the global control performance, trying to keep the resource utilization at a high level and distributing the computing resources among the control tasks. In particular, in feedbackfeedforward scheduling of control tasks, the dispatcher uses feedback from execution time measurements and feedforward from workload changes to adjust the sampling period of the controller, so that the performance of the closed-loop control system is maximized Off-line scheduling Off-line scheduling algorithms require the programmer to define the entire scheduling prior to the execution. According to this table-driven approach the time line is divided into slots of fixed length (minor cycle) and tasks are statically allocated in each slot based on their rates and execution requirements. The schedule is then constructed up to the least common multiple of all periods (called the hyperperiod or the major cycle) and stored in a table. At run-time, tasks are dispatched according to the table and synchronized by a timer at the beginning of each minor cycle. Given a set of periodic processes the problem to schedule them meeting their deadline and period constraints is known to be NP-hard for one processor, which means that in the worst case an exponential amount of work appears necessary to determine whether a feasible solution exists. In other words, in the worst case an exhaustive search is necessary in order to determine if a schedulable solution exists or not. In practice, most cyclic executive schedules are derived manually, but they can also be automated, despite deriving an optimal schedule is theoretically an intractable (NP-hard) problem. On one hand, off-line algorithms allow to consider and to manage complex dependencies between tasks and resource contention among jobs when constructing the static table. Moreover, this policy produce programs that are entirely deterministic, so it is possible to know which task is executing at any given time. As tasks always execute in their preallocated slots, the experienced jitter is very small. Furthermore, the entire schedule is captured in a static table, so different operating modes can be represented by different tables. On the other hand, this scheduling policy is fragile during overload situations, since a task exceeding its predicted execution time could generate a domino 20

32 3.2. Scheduling Algorithms effect on the subsequent tasks, causing their execution to exceed the minor cycle boundary. In addition, off-line scheduling is not flexible enough for handling dynamic situations. In fact, a creation of a new task, or a change in a task rate, might modify the values of the minor and major cycle, thus requiring a complete redesign of the scheduling table. So, the off-line scheduling approach is more suitable for static configuration of systems. Another potential source of inefficiency is the need to fit all activities into common multiples of the major and minor cycle (so if an activity does not fit exactly into the schedule it may be necessary to rewrite the code to make it fit). 21

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe Introduction Wireless devices are everywhere! We use wireless devices in everyday life.

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

HART COMMUNICATION. A Digital Upgrade For Existing Plants

HART COMMUNICATION. A Digital Upgrade For Existing Plants HART COMMUNICATION 1. The majority of smart field devices installed worldwide today are HART-enabled. But some new in the automation field may need a refresher on this powerful technology. Simply put,

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Real-Time Communications. LS 12, TU Dortmund

Real-Time Communications. LS 12, TU Dortmund Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.

More information

Time Triggered and Event Triggered; Off-line Scheduling

Time Triggered and Event Triggered; Off-line Scheduling Time Triggered and Event Triggered; Off-line Scheduling Real-Time Architectures -TUe Gerhard Fohler 2004 Mälardalen University, Sweden gerhard.fohler@mdh.se Real-time: TT and ET Gerhard Fohler 2004 1 Activation

More information

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 8 Stockholm, November 11, 2011 Routing, Zigbee, and RPL Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Principles of Wireless Sensor Networks. Medium Access Control and IEEE http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 7 Stockholm, November 8, 2011 Medium Access Control and IEEE 802.15.4 Royal Institute of Technology - KTH Stockholm, Sweden e-mail:

More information

EL2745 Principles of Wireless Sensor Networks

EL2745 Principles of Wireless Sensor Networks EL2745 Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 5 Stockholm, February 2, 2012 Carlo Fischione Royal Institute of Technology

More information

DISTRIBUTED REAL-TIME SYSTEMS

DISTRIBUTED REAL-TIME SYSTEMS Distributed Systems Fö 11/12-1 Distributed Systems Fö 11/12-2 DISTRIBUTED REAL-TIME SYSTEMS What is a Real-Time System? 1. What is a Real-Time System? 2. Distributed Real Time Systems 3. Predictability

More information

Precedence Graphs Revisited (Again)

Precedence Graphs Revisited (Again) Precedence Graphs Revisited (Again) [i,i+6) [i+6,i+12) T 2 [i,i+6) [i+6,i+12) T 3 [i,i+2) [i+2,i+4) [i+4,i+6) [i+6,i+8) T 4 [i,i+1) [i+1,i+2) [i+2,i+3) [i+3,i+4) [i+4,i+5) [i+5,i+6) [i+6,i+7) T 5 [i,i+1)

More information

Multimedia Systems 2011/2012

Multimedia Systems 2011/2012 Multimedia Systems 2011/2012 System Architecture Prof. Dr. Paul Müller University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Sitemap 2 Hardware

More information

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system Real world exposed programs Programs written to interact with the real world, outside the computer Programs handle input and output of data in pace matching the real world processes Necessitates ability

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012 1 A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications I R F A N S. A L - A N B A G I, M E L I K E E R O L - K A N T A R C I, H U S S E I N T. M O U F T A H U N I V E

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

A CAN-Based Architecture for Highly Reliable Communication Systems

A CAN-Based Architecture for Highly Reliable Communication Systems A CAN-Based Architecture for Highly Reliable Communication Systems H. Hilmer Prof. Dr.-Ing. H.-D. Kochs Gerhard-Mercator-Universität Duisburg, Germany E. Dittmar ABB Network Control and Protection, Ladenburg,

More information

Scheduling Algorithm and Analysis

Scheduling Algorithm and Analysis Scheduling Algorithm and Analysis Model and Cyclic Scheduling (Module 27) Yann-Hang Lee Arizona State University yhlee@asu.edu (480) 727-7507 Summer 2014 Task Scheduling Schedule: to determine which task

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Cross Layer QoS Provisioning in Home Networks

Cross Layer QoS Provisioning in Home Networks Cross Layer QoS Provisioning in Home Networks Jiayuan Wang, Lukasz Brewka, Sarah Ruepp, Lars Dittmann Technical University of Denmark E-mail: jwan@fotonik.dtu.dk Abstract This paper introduces an innovative

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 5 January 31, 2013 Carlo Fischione Associate Professor of Sensor Networks e-mail: carlofi@kth.se http://www.ee.kth.se/~carlofi/

More information

LXRS and LXRS+ Wireless Sensor Protocol

LXRS and LXRS+ Wireless Sensor Protocol LORD TECHNICAL NOTE LXRS and LXRS+ Wireless Sensor Protocol Using LXRS and LXRS+ For Long-Term Monitoring and High Bandwidth Test and Measurement Introduction LORD Sensing has developed and deployed two

More information

ENSC 427: COMMUNICATION NETWORKS

ENSC 427: COMMUNICATION NETWORKS ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee

More information

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee

Performance Analysis of Beacon Enabled IEEE Using GTS in Zigbee Performance Analysis of Beacon Enabled IEEE 802.15.4 Using GTS in Zigbee Rajashri Wavage PG Student Computer Science and Engineering Baddi University of Emerging Science and Technology Aman Kaushik. Asst.

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 6 Stockholm, February 6, 2012 Carlo Fischione Royal Institute of Technology - KTH

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date:

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date: Subject Name: OPERATING SYSTEMS Subject Code: 10EC65 Prepared By: Kala H S and Remya R Department: ECE Date: Unit 7 SCHEDULING TOPICS TO BE COVERED Preliminaries Non-preemptive scheduling policies Preemptive

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)

More information

ZigBee/ David Sanchez Sanchez.

ZigBee/ David Sanchez Sanchez. ZigBee/802.15.4 David Sanchez Sanchez david.sanchezs@upf.edu Lecture Overview 1. Introduction and motivation to ZigBee 2. ZigBee/802.15.4 specification 1. Definitions 2. MAC communication modes 3. Network

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Multi-channel TDMA Scheduling in Wireless Sensor Networks

Multi-channel TDMA Scheduling in Wireless Sensor Networks Multi-channel TDMA Scheduling in Wireless Sensor Networks Ozge Uyanik and Ibrahim Korpeoglu Bilkent University Department of Computer Engineering 06800, Ankara, Turkey {ouyanik,korpe}@cs.bilkent.edu.tr

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Sanjit A. Seshia UC Berkeley EECS 9/9A Fall 0 008-0: E. A. Lee, A. L. Sangiovanni-Vincentelli, S. A. Seshia. All rights reserved. Chapter : Operating Systems, Microkernels,

More information

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1 Wireless Local Area Networks The proliferation of laptop computers and other mobile devices

More information

Communication in Avionics

Communication in Avionics Communication in Avionics 1 Outline Basic Overview Communication architectures Event Triggered Time Triggered Communication architecture examples Case Study: How Data Communication Affects Scheduling 2

More information

Implementation of a wirelesshart simulator and its use in studying packet loss compensation in networked control

Implementation of a wirelesshart simulator and its use in studying packet loss compensation in networked control Implementation of a wirelesshart simulator and its use in studying packet loss compensation in networked control MAURO DE BIASI Masters Degree Project Stockholm, Sweden February 2008 XR-EE-RT 2008:010

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Computer Communication III

Computer Communication III Computer Communication III Wireless Media Access IEEE 802.11 Wireless LAN Advantages of Wireless LANs Using the license free ISM band at 2.4 GHz no complicated or expensive licenses necessary very cost

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Wireless Sensor Networks (WSN)

Wireless Sensor Networks (WSN) Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile

More information

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks IEEE 35 th International Conference on Computer Communications (INFOCOM 16) 10-15 April 2016 San Francisco,, USA Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks Behnam Dezfouli Marjan

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Multiprocessor and Real-Time Scheduling. Chapter 10

Multiprocessor and Real-Time Scheduling. Chapter 10 Multiprocessor and Real-Time Scheduling Chapter 10 1 Roadmap Multiprocessor Scheduling Real-Time Scheduling Linux Scheduling Unix SVR4 Scheduling Windows Scheduling Classifications of Multiprocessor Systems

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

Exam Review TexPoint fonts used in EMF.

Exam Review TexPoint fonts used in EMF. Exam Review Generics Definitions: hard & soft real-time Task/message classification based on criticality and invocation behavior Why special performance measures for RTES? What s deadline and where is

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

Självständigt arbete på avancerad nivå

Självständigt arbete på avancerad nivå Självständigt arbete på avancerad nivå Independent degree project second cycle Computer Engineering Implementation of the WirelessHART i Abstract Industrial wireless sensor network (IWSN) is an application

More information

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar Papa Alioune Ly, Joel Alloh, Carl Hedari, Tom Reynaert Outline Introduction Design of the

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Introduction to Real-Time Systems ECE 397-1

Introduction to Real-Time Systems ECE 397-1 Introduction to Real-Time Systems ECE 97-1 Northwestern University Department of Computer Science Department of Electrical and Computer Engineering Teachers: Robert Dick Peter Dinda Office: L477 Tech 8,

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

IEEE Time-Sensitive Networking (TSN)

IEEE Time-Sensitive Networking (TSN) IEEE 802.1 Time-Sensitive Networking (TSN) Norman Finn, IEEE 802.1CB, IEEE 802.1CS Editor Huawei Technologies Co. Ltd norman.finn@mail01.huawei.com Geneva, 27 January, 2018 Before We Start This presentation

More information

FIXED PRIORITY SCHEDULING ANALYSIS OF THE POWERTRAIN MANAGEMENT APPLICATION EXAMPLE USING THE SCHEDULITE TOOL

FIXED PRIORITY SCHEDULING ANALYSIS OF THE POWERTRAIN MANAGEMENT APPLICATION EXAMPLE USING THE SCHEDULITE TOOL FIXED PRIORITY SCHEDULING ANALYSIS OF THE POWERTRAIN MANAGEMENT APPLICATION EXAMPLE USING THE SCHEDULITE TOOL Jens Larsson t91jla@docs.uu.se Technical Report ASTEC 97/03 DoCS 97/82 Department of Computer

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Implementing Scheduling Algorithms. Real-Time and Embedded Systems (M) Lecture 9

Implementing Scheduling Algorithms. Real-Time and Embedded Systems (M) Lecture 9 Implementing Scheduling Algorithms Real-Time and Embedded Systems (M) Lecture 9 Lecture Outline Implementing real time systems Key concepts and constraints System architectures: Cyclic executive Microkernel

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

Design of a wirelesshart simulator for studying delay compensation in networked control systems

Design of a wirelesshart simulator for studying delay compensation in networked control systems Design of a wirelesshart simulator for studying delay compensation in networked control systems CARLO SNICKARS Masters Degree Project Stockholm, Sweden February 2008 XR-EE-RT 2008:009 Contents 1 Introduction

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD IEC 62591 Edition 1.0 2010-04 colour inside Industrial communication networks Wireless communication network and communication profiles WirelessHART IEC 62591:2010(E) THIS PUBLICATION

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Wzzard Sensing Platform Network Planning and Installation. Application Note

Wzzard Sensing Platform Network Planning and Installation. Application Note Wzzard Sensing Platform Network Planning and Installation Application Note 1 International Headquarters B&B Electronics Mfg. Co. Inc. 707 Dayton Road Ottawa, IL 61350 USA Phone (815) 433-5100 -- General

More information

DRAFT. Dual Time Scale in Factory & Energy Automation. White Paper about Industrial Time Synchronization. (IEEE 802.

DRAFT. Dual Time Scale in Factory & Energy Automation. White Paper about Industrial Time Synchronization. (IEEE 802. SIEMENS AG 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 DRAFT Dual Time Scale in Factory & Energy Automation White Paper about Industrial

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information