Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Similar documents
May doc.: IEEE Submission Title: [MAC for IEEE ]

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Mobile Communications

Introduction to IEEE

Project IEEE P G Working Group for Wireless Personal Area Networks

SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS. X.Xiang X.Wang Y.Yang

Mobile Communications. Ad-hoc and Mesh Networks

Protocols and procedures (part I)

Protocols and procedures (part II)

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

IEEE s ESS Mesh Networking

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Wireless Sensor Networks

802.22b NICT Proposal

Project: IEEE P Working Group for Wireless Personal Area Networks N

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Wireless Mesh Networks

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Advanced Network Approaches for Wireless Environment

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme

Principles of Wireless Sensor Networks

Zigbee protocol stack overview

Politecnico di Milano Advanced Network Technologies Laboratory. ZigBee Revealed

Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks

Arvind Krishnamurthy Fall 2003

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Notes on implementing a IEEE s Mesh Point

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

To enhance Routing in ZigBee Wireless Networks

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Lecture 15 Networking Fundamentals. Today s Plan

Reconfigure ZigBee Network Based on System Design

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Wireless Sensor Networks Module 2: Routing

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

ZigBee/ David Sanchez Sanchez.

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

IEEE Broadband Wireless Access Working Group < Re: IEEE P802.16j/D1: IEEE j working group letter ballot #28

Institute of Electrical and Electronics Engineers (IEEE) PROPOSED AMENDMENTS TO [IMT.EVAL]

Internet Engineering Task Force (IETF) Request for Comments: Category: Experimental February 2014 ISSN:

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

Routing over Low Power and Lossy Networks

Topic 02: IEEE

Wireless Sensor Networks

Lecture 6 ZigBee Device Object (ZDO) and Network Layer (NWK)

Communications Options for Wireless Sensor Networks. Marco Zennaro and Antoine Bagula ICTP and UWC Italy and South Africa

Computer Networking Introduction

Shortcut Tree Routing in ZigBee Networks

CE693: Adv. Computer Networking

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

IEEE P IEEE P Wireless Personal Area Networks

Davide Quaglia Assistant CS depart University of Verona, Italy

ZigBee. Jan Dohl Fabian Diehm Patrick Grosa. Dresden,

CS5984 Mobile Computing

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

By Nick Giannaris. ZigBee

Lecture (08) Wireless Traffic Flow and AP Discovery

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Chapter 4: outline. Network Layer 4-1

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Project: IEEE P Working Group for Wireless Personal Area Networks N

Simulation Analysis of the MH-TRACE Protocol. Bora KARAOGLU

Introduction to IEEE

Content 1/28/2013. Lecture 6. Network Layer (NWK) Z-Stack ZDO Interface

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

Table of Contents 1 WLAN Service Configuration 1-1

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

1900 series standardizations and coexistence scenarios for TVWS

Top-Down Network Design

QoS multi meshed tree routing in tethered MANET

Information Brokerage

Wireless Sensor Networks

LECTURE 9. Ad hoc Networks and Routing

IEEE C802.16maint-05/091r1. IEEE Broadband Wireless Access Working Group <

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Token Ring VLANs and Related Protocols

Configuring IP Multicast Routing

Modification on DFS and DCF procedure adapting to FCC rules in TVWS Part 2: Hidden Node Date: xx Authors:

Transcription:

Project: IEEE P802.5 Working Group for Wireless Personal Area Networks (WPANs) Title: [Response to the call for final proposal to TG0] Date Submitted: [4 July, 204] Source: * [Verotiana Rabarijaona, Fumihide Kojima], [Hiroshi Harada] Company *[NICT], [Kyoto University] Address *[3-4, Hikarino-oka, Yokosuka, 239-0847 Japan], [36- Yoshida-Honmachi, Sakyo-ku, Kyoto 606-850 Japan] Voice:[+8-46-847-5075], FAX: [+8-46-847-5089], E-Mail:[rverotiana@nict.go.jp] Re: [Call for Final Proposals.] Abstract: [This contribution presents a full proposal for the TG0.] Purpose: [Final proposal to TG0.] Notice: This document has been prepared to assist the IEEE P802.5. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.5. Slide

Hierarchical Mesh Tree Routing Verotiana Rabarijaona, Fumihide Kojima (NICT), Hiroshi Harada (Kyoto University) Slide 2

Outline This proposal includes the following features: Hierarchical Mesh Tree formation, maintenance update HMT Routing High reliability Data aggregation Slide 3

Smart metering Environment monitoring Structure monitoring Parking monitoring Typical Use cases Slide 4

Motivation The current 802.5.4 builds a cluster tree topology Data frames can only be sent between device and coordinator Even when a routing protocol is applied from the upper layer, it is constrained at the MAC layer by the cluster tree topology The D2D function in 5.4m allows devices associated to the same coordinator to send packets to each other directly but does not provide routing capability to distant nodes Slide 5

HMT formation() Each node is required to associate with a coordinator after performing an active or passive scan as described in Section 5..3. of IEEE Std 802.5.4-20 Each node has a depth representing the distance of that node to the root of the tree (a FFD providing a service or a gateway ) in number of hops The depth of a device is carried in an enhanced beacon (EB) The service(s)/gateway provided by the tree is advertised in the EB The construction of the tree starts with the broadcast of a EB advertising a service and with a depth 0 by the service provider or gateway which becomes the root of the tree Slide 6

HMT formation (2) For a particular routing tree, a node holds a neighbor table filled based on the EBs and data frames received Neighbor ID Neighbor Depth Metric Metric n List of reachable destinations A neighbor is categorized according to its depth. If the depth of a node M is D M and the depth of a neighbor N is D N If D M > D N N is a parent If D M = D N N is a brother If D M < D N N is a child There may be a limit in the size of the neighbor table based on the resources of a node. In this case, only the best neighbors (metric-wise) are recorded. A device must have at least have one entry in its neighbor table with one parent A node starts filling up its neighbor table only after association to the PAN. It ensures that only nodes from the same PAN are recorded as neighbors Slide 7

HMT formation (3) After the HMT formation, a device can join a routing tree by performing an active or passive scan to listen to EBs and find the services/gateway available. A device (typically a FFD) may join different routing trees if it has enough resources. Example of a HMT: I-2 L -2 M-3 N-3 Depth 0 R Parent-child link Brotherhood link C- R-0 A - J -2 K-2 A F B C D E D- B - F - G -2 H -2 2 I L J K H G E- 3 M N Slide 8

Depth 0 HMT maintenance and update The neighbor table is maintained through periodic EB broadcasts A node s depth and the neighbor table is updated according to the changes in the network reflected by the presence/absence of EBs If a node is disassociated to its coordinator in the PAN, it either tries to reassociate or tries to associate with another parent in the neighbor table. R Parent-child link Brotherhood link Depth 0 R Parent-child link Brotherhood link A F B C D E A F B C D E 2 I L J K H G 2 I L M J K G 3 M N 3 Slide 9 O N H

HMT Routing - MP2P () Based on a link quality metric (BER, success rate, latency, SINR ). The metric(s) to be used is determined by the root of the tree and spread through EBs Reactive routing through parents and/or brothers with priority given to the parents through a Link Quality Threshold (LQT) w.r.t the chosen metric: If the metric offered by the best parent does not satisfy the LQT, the packet is routed through the best brother. If the metric offered by the best brother does not satisfy the LQT, the packet is routed through the device with the best metric between the best parent and the best brother. The LQT may be set globally by the root, or locally and dynamically by a device to adapt to the local channel conditions A node holds the list of TAs and RAs of a packet with a given (SN, SA, DA) tuple. In order to avoid loops, a node shall select a next hop that is not in that list. The list shall be erased after a TBD time Slide 0

Depth HMT Routing - MP2P (2) Example of M R routing 0 R 7.65 4.09 0.6 0.2 4.05 3.58 2.66 A 5.24 F.2 B C 0.67 D 3.5 E 2 I.6 3.2 5.8 6.34 L 4.72 J 3.89 6.8 6.28 8.34 9.4 K.2 H 7.5 G 3.03.22 8.67 5.5 LQT = 4 3 M 0.7 N No LQT Slide

HMT Routing - P2MP() When a device receives/overhears(if allowed) a packet to forward upstream (i.e. to the root), it includes the address of the source of the packet in the List of reachable destinations of the neighbor from which it received the packet (i.e. previous hop.) This list can be classified into 6-bit addresses and 64-bit addresses. Neighbor ID Neighbor Depth Metric Metric n List of reachable destinations This neighbor table allows memory saving compared to a regular routing table Ex: R s table, assuming 6-bit addresses, -byte depth, 4-byte metric Destination Next hop Metric A A 7.65 M A 7.65 N A 7.65 I A 7.65 L A 7.65 J A 7.65 F F 0.6 J F 0.6 K F 0.6 H F 0.6 G F 0.6 Neighbor ID Depth Metric List of reachable destinations A 7.65 M N I L J F 0.6 J K H G Filled based on received EBs 88 bytes Slide 2 32 bytes Filled with the SA of received data frames

HMT Routing - P2MP(2) If a device does not have a data packet to transmit for a prolonged period of time, it sends a MP frame with a Destination Announcement IE (Dest-A IE) upstream When a device needs to forward a packet downstream, it looks up into its neighbor table and finds the neighbor with the best link quality metric through which the destination is reachable, with priority given to the child neighbors through a LQT If the devices of the network (besides the root) do not have enough memory to maintain the list of reachable destinations (non-storing mode), source routing is used. Each intermediate device on the way upstream appends its own address to the Dest-A IE. The list of intermediate hops is included in a packet to be sent downstream. Each intermediate device removes its address from the list before forwarding the packet. Slide 3

Example of R J routing HMT Routing - P2MP(2) Neighbor ID Depth LQ List of reachable destinations R A 7.65 M N I L J F 0.6 J K H G Depth 0 Destination Best link quality Selected next hop A F Neighbor ID Depth LQ List of reachable destinations R 0 7.65 F 5.24 J K H G J 2 3.2 N Neighbor ID Depth LQ List of reachable destinations R 0 0.6 A 5.24 L M J J 2 4.72 N R 7.65 4.09 0.6 2.66 0.2 4.05 3.58 5.24 A F.2 0.67 3.5 B C D E 2 I.6 5.8 3.2 L 6.34 4.72 J 3.89 6.8 6.28 8.34 9.4.2 7.5 K H G 3 3.03.22 M 0.7 8.67 N 5.5 Slide 4

Depth 0 HMT Routing P2P When a device D has a packet to transmit to another device D2, it looks into its neighbor table if there is a route to D2. If there is a route, the packet is forwarded to the neighbor through which D2 is reachable If there is no route, the packet is forwarded upstream Example of M G routing R 7.65 0.6 2.66 4.09 0.2 4.05 3.58 A 5.24.2 0.67 3.5 F B C D E 2 I.6 5.8 L 3.2 6.34 4.72 J 3.89 6.8 6.28 8.34 9.4 K.2 H 7.5 G 3 3.03 M.22 0.7 8.67 5.5 N Slide 5 LQT = 4 No LQT

HMT Routing Multicast() If a node is subscribed to a multicast group, it informs the network with the Dest-A IE including a Multicast subscription field, containing the multicast address. When a device receives a Dest-A IE with a Multicast subscription field, the multicast address is added to the list of reachable destinations A device uses the same algorithm as for P2P routing with the multicast address as the destination address and as the next hop address, i.e. a device forwards a multicast packet only if the multicast address is reachable through one of its neighbors. This avoids flooding the network. A device forwards a packet only once, except if the packet requires an ACK and ACK was not received from each intended next hop Slide 6

Depth HMT Routing Multicast(2) Example of multicast routing E 0 R 7.65 0.6 2.66 4.09 0.2 4.05 3.58 5.24.2 0.67 3.5 A F B C D E.6 5.8 3.2 4.72 6.8 8.34 6.28 9.4 2 I L 6.34 J 3.89 K.2 7.5 H G 3 3.03 M.22 0.7 8.67 N 5.5 LQT = 4 Member of the multicast group Slide 7

HMT Routing - Broadcast a. If the root of the tree is the source of a broadcast data frame, a device shall forward the packet only if it has children neighbors. b. If a device other than the root of the tree is the source of a broadcast data frame, the frame shall be sent to the root first and broadcast downstream as in a. Slide 8

Depth 0 High reliability option If the high reliability (HR) option is on, the AR field must be set to. If an acknowledgment is not received after a packet transmission, the packet is forwarded through another neighbor In particular, the HR option can be used when no LQT is set, i.e. the next hop must be a parent but if the transmission fails, the packet is rerouted through the best of the parents/brothers R 7.65 4.09 0.6 0.2 4.05 3.58 0.66 A 5.24 F.2 B C 0.67 D 3.5 E 2 I.6 5.8 L 3.2 6.34 J 4.72 3.89 6.8 6.28 8.34 9.4 K.2 H 7.5 G 3 3.03 M.22 0.7 8.67 N 5.5 No LQT Slide 9

Data aggregation () A node aggregates the packets collected from its neighbors with its own pending packet (if present) before forwarding them. Reduce collisions Reduce the bottleneck effect as we get closer to the root of the tree The number of aggregated packets is limited by the maximum size of a frame Packets can be aggregated only if they have the same destination Slide 20

Data aggregation (2) R FFD Root (PAN coord) RFD R Coordinator Association & parent-child link Parent-child link Brotherhood link R : Normal frame : Relayed frame : Aggregated frame R A B A B A B C C C D E D E D E F G H F G H F G H (a) w/o aggregation or HMT routing (b) Only w/ aggregation (c)w/ aggregation and HMT routing Slide 2

Used in EBs or command frames HMT Construction IE Bit: 0-6 7-4 5 Octets: Variable Length Element ID Type = 0 (Header) IE content Octets: 0/2/8 0/ Bits: 0 2-5 6-7 Octets: variable Service/ Gateway ID Tree Root ID Depth High reliability Data aggregation 0: not allowed : allowed Number N of metrics Reserved Link Quality Metric 2 Octets: 0- variable Link Quality Metric N X Number of services/ gateway provided/ subscribed/ connected to In a Enhanced Beacon Request, if the device knows the service or gateway it is trying to connect to, only the Service/Gateway ID is present. Otherwise the IE content is empty 2 The link quality metrics and the related parameters are up to the implementer and are set in the PIB Bits: 0-3 4-7 0/Variable 0/Variable Link quality metric ID Priority Threshold Value Slide 22

L2R Routing IE Used in data frames Bit: 0-6 7-4 5 Octets: Variable Length Element ID Type = 0 (Header) IE content Octets: 2 2/8 4 0/Variable Bits: 0-2 3-7 Service/ Gateway ID Tree Root ID Depth Addressing fields Data aggregation 0: must not be buffered and aggregated, must be forwarded immediately : may be buffered and aggregated Flow 00: Up 0: Down 0: broadcast up : broadcast down Reserved Octets: 2/8 2 2/8 Final Destination address (D) Original Source address (D) Used for a broadcast data frame originated by a device other that the root of the tree. The data frame is forwarded to the root first then broadcast. The flow is switched to (broadcast down) when the data frame reaches the root 2 The addressing mode shall be the same as those used in the MHR Slide 23

Data aggregation IE Used in data frames Bit: 0-6 7-4 5 Octets : variable Length Element ID Type = 0 (Header) IE content Bits: 0-3 6-7 Octets: Number N of aggregated packets Reserved Size of the aggregated packet in octets Size of the aggregated packet N in octets Slide 24

Destination Announcement IE Used in a MP frame sent to the root of the tree. Bit: 0-0 -4 5 Octets : variable Length Element ID Type = 0 (Header) IE content Octets: Variable 0/2/8 0/2/8 Multicast subscription Intermediate hop address Intermediate hop address N Bits: 0-5 6-7 Octets: 0/2/8 0/2/8 Number M of multicast group 2 Addressing mode Multicast address Multicast address M Intermediate hop addresses are used for source routing in a non storing mode network, otherwise, they are not appended at each hop. 2 If the node does not belong to any multicast group M = 0 Slide 25

Simulation results () Link quality metric: SINR Link failure rate and SINR mapping 0-2 0 - LFR SINR 0-4 0-3 0-5 0-6 0-6 23 0-5 9 0-4 2 0-3 0 0-2 6 0-5 Slide 26

Preliminary Simulation results (2) Performance criteria No SINR threshold SINR threshold = 9 SINR threshold = 8 Initialization time (s) 26.39235 US E2E successful transmission ratio (%) DS E2E successful transmission ratio (%) Number of hops Min Max US Average DS Average E2E transmission delay (s) Min Max US Average DS Average Scenario: x devices 97.298 99.456 99.85 98.687 99.625 99.89 5 2.047 2.356 0.063 0.0976 0.039 0.0444 9 4.429 4.452 0.063 0.25 0.0849 0.0884 2 5.494 5.33 0.063 0.24 0.05 0.04 No Slide 27

Preliminary Simulation results (3) Performance criteria No SINR threshold SINR threshold = 9 SINR threshold = 8 Initialization time (s) 5.24705 US E2E successful transmission ratio (%) DS E2E successful transmission ratio (%) Number of hops Min Max US Average DS Average E2E transmission delay (s) Min Max US Average DS Average Scenario: 33 x 33 devices 83.296 87.35 98.945 83.8403 86.90 90.756 5.47 5.33 0.063.68 0.0989 0.025 7 9.352 9.503 0.063.33 0.8 0.85 25 4.322 3.40 0.063.45 0.274 0.257 Slide 28

Thank you Q/A Slide 29