Ad Hoc Nets - MAC layer. Part II TDMA and Polling

Similar documents
Bluetooth: Short-range Wireless Communication

Bluetooth. Renato Lo Cigno

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Introduction to Bluetooth Wireless Technology

e-pg Pathshala Quadrant 1 e-text

Bluetooth Demystified

Wireless Sensor Networks

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Local Area Networks NETW 901

Personal Area Networking over Bluetooth

Wireless Local Area Network. Internet Protocol Suite

Embedded Systems. 8. Communication

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

CS263: Wireless Communications and Sensor Networks

Wireless Communications

Simulation of Bluetooth Network

CHAPTER 12 BLUETOOTH AND IEEE

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

A Guide. Wireless Network Library Bluetooth

Redes Inalámbricas Tema 2.B Wireless PANs: Bluetooth

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

Ah-Hoc, PAN, WSN,... Introduction Bluetooth ( ) Zigbee ( ) Renato Lo Cigno

Communication Systems. WPAN: Bluetooth. Page 1

Amarjeet Singh. February 7, 2012

Dominique Chomienne & Michel Eftimakis NewLogic

Introduction to Wireless Networking ECE 401WN Spring 2009

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

Introduction to Bluetooth

Bluetooth Baseband. Chingwei Yeh 2001/9/10

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

Bluetooth. Bluetooth Radio

Wireless Networked Systems

BASEBAND SPECIFICATION

Multiple Access Links and Protocols

System Level Analysis of the Bluetooth standard

Bluetooth. The Bluetooth Vision. Universal Wireless Connectivity. Universal Wireless Connectivity

Lecture 16: QoS and "

Bluetooth. Bluetooth. WPAN Technologies. HomeRF. Bluetooth. Claudio Casetti. Dipartimento di Elettronica Politecnico di Torino

Guide to Wireless Communications, 3 rd Edition. Objectives

Efficient Multicast Schemes for Mobile Multiparty Gaming Applications

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Bluetooth. Basic idea

Wireless LANs & PANs Case Study: Bluetooth & IEEE W.lan.4

Structure of the Lecture

Objectives of the Bluetooth Technology

Computer Networks II Advanced Features (T )

MULTIPLE ACCESS PROTOCOLS 2. 1

Special Course in Computer Science: Local Networks. Lecture

Lecture Computer Networks

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Multiple Access in Cellular and Systems

Wireless Personal Area Networks

Chapter 6 Wireless and Mobile Networks

Wireless networks. Wireless Network Taxonomy

Class-based Packet Scheduling Policies for Bluetooth

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

13 Wireless. Communications Using Bluetooth. Oge Marques and Nitish Barman CONTENTS

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Implementing A Bluetooth Stack on UEFI

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

By N.Golmie Presented by: Sushanth Divvela

CSC 4900 Computer Networks: Wireless Networks

Feasibility of a Bluetooth Based Structural Health Monitoring Telemetry System

IEEE P Working Group for Wireless Personal Area Networks TM

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

ECE 4450:427/527 - Computer Networks Spring 2017

Delivering Voice over IEEE WLAN Networks

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Bluetooth. Bluetooth Basics Bluetooth and Linux Bluetooth at AG Tech. Dr.-Ing. H. Ritter, 7.1

Mobile Communications Chapter 7: Wireless LANs

Qos support and adaptive video

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Overview of Bluetooth Technology

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Reti degli elaboratori

By FaaDoOEngineers.com

PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Chapter 5. Wireless PANs

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Improving Simultaneous Voice and Data Performance in Bluetooth Systems

The Bluetooth Radio System

Sensor Application for Museum Guidance

Multiple Access Protocols

Mobile and Sensor Systems

Links. CS125 - mylinks 1 1/22/14

Wireless LANs/data networks

CS 455/555 Intro to Networks and Communications. Link Layer

ECE 435 Network Engineering Lecture 8

MAC in /20/06

Transcription:

Ad Hoc Nets - MAC layer Part II TDMA and Polling

More MAC Layer protocols Bluetooth Piconet: a polling/tdma scheme Cluster TDMA: based on TDMA (with random access and reserved slots) research protocol developed at UCLA for the DARPA-WAMIS project (1994)

Bluetooth: Where does the name come from?

Bluetooth working group history February 1998: The Bluetooth SIG is formed promoter company group: Ericsson, IBM, Intel, Nokia, Toshiba May 1998: Public announcement of the Bluetooth SIG July 1999: 1.0A spec (>1,500 pages) is published December 1999: ver. 1.0B is released December 1999: The promoter group increases to 9 3Com, Lucent, Microsoft, Motorola March 2001: ver. 1.1 is released Aug 2001: There are 2,491+ adopter companies

What does Bluetooth do for you? Synchronization Automatic synchronization of calendars, address books, business cards Push button synchronization Proximity operation

Cordless Headset Cordless headset User benefits Multiple device access Cordless phone benefits Hands free operation

Putting it all together.. Landline Data/Voice Access Points Cable Replacement and combinations! Personal Ad-hoc Networks

Example...

Bluetooth Physical link Point to point link master - slave relationship radios can function as masters or slaves m s Piconet Master can connect to 7 slaves Each piconet has max capacity =1 Mbps hopping pattern is determined by the master s m s s

Connection Setup Inquiry - scan protocol to learn about the clock offset and device address of other nodes in proximity

Inquiry on time axis Slave1 f1 f2 Master Inquiry hopping sequence Slave2

Piconet formation Page - scan protocol to establish links with nodes in proximity Master Active Slave Parked Slave Standby

Addressing Bluetooth device address (BD_ADDR) 48 bit IEEE MAC address Active Member address (AM_ADDR) 3 bits active slave address all zero broadcast address Parked Member address (PM_ADDR) 8 bit parked slave address

Bluetooth Piconet Page - scan protocol to establish links with nodes in proximity Master Active Slave Parked Slave Standby

FH/TDD m Piconet MAC protocol : Polling f1 f2 f3 f4 f5 f6 s1 s2 625 lsec 1600 hops/sec

FH/TDD Multi slot packets f1 f4 f5 f6 m s1 s2 625 µsec Data rate depends on type of packet

Physical Link Types Synchronous Connection Oriented (SCO) Link slot reservation at fixed intervals Asynchronous Connection-less (ACL) Link Polling access method m SCO ACL ACL SCO ACL ACL SCO ACL ACL s1 s2

Packet Types Control packets Data/voice packets ID* Null Poll FHS DM1 Voice HV1 HV2 HV3 DV DM1 DM3 DM5 data DH1 DH3 DH5

Packet Format 72 bits 54 bits 0-2744 bits Access code Header Payload Voice header Data CRC No CRC No retries FEC (optional) ARQ FEC (optional) 625 µs master slave

Access Code 72 bits Access code Header Payload Purpose Synchronization DC offset compensation Identification Signaling Types Channel Access Code (CAC) Device Access Code (DAC) Inquiry Access Code (IAC) X

Access code Purpose 54 bits Header Addressing (3) Packet type (4) Flow control (1) 1-bit ARQ (1) Sequencing (1) HEC (8) total 18 bits Packet Header Encode with 1/3 FEC to get 54 bits Payload Max 7 active slaves Broadcast packets are not ACKed For filtering retransmitted packets s m 16 packet types (some unused) Verify header integrity s s

Voice Packets (HV1, HV2, HV3) 72 bits 54 bits 240 bits Access Header code 30 bytes = 366 bits Payload HV1 10 bytes + 1/3 FEC HV2 20 bytes + 2/3 FEC HV3 2.5ms 1.25ms (HV1) 3.75ms (HV2) 30 bytes (HV3)

Data rate calculation: DM1 and DH1 625 µs 72 bits 54 bits 240 bits Access code Header 30 bytes = 366 bits DM1 Payload 1 17 2 2/3 FEC Di r Size 17 17 Freq 1600/2 Rate 108.8 108.8 DH1 1 27 2 27 27 172.8 172.8 625 µs 1 2

Data rate calculation: DM3 and DH3 1875 µs 72 bits 54 bits 1500 bits = 1626 bits Access code Header 187 bytes DM3 Payload 2 121 2 2/3 FEC Di r Size 121 17 Freq 1600/4 Rate 387.2 54.4 DH3 2 183 2 183 27 585.6 86.4 1875 µs 1 2 3 4

Data rate calculation: DM5 and DH5 3125 µs 72 bits 54 bits Access Code Header 2744 bits 343 bytes = 2870 bits DM5 Payload 2 224 2 2/3 FEC Di r Size 224 17 Freq 1600/6 Rate 477.8 36.3 DH5 2 339 2 339 27 723.2 57.6 3125 µs 625 µs 1 2 3 4 5 6

Data Packet Types DM1 Symmetric Asymmetric 108.8 108.8 108.8 DM3 258.1 387.2 54.4 2/3 FEC DM5 286.7 477.8 36.3 No FEC DH1 DH3 DH5 Symmetric Asymmetric 172.8 172.8 172.8 390.4 585.6 86.4 433.9 723.2 57.6

Inter piconet communication Cordless headset mouse Cordless headset Cell phone Cell phone Cell phone Cordless headset

Scatternet

Scatternet, scenario 2 How to schedule presence in two piconets? Forwarding delay? Missed traffic?

Device 1 Baseband: Summary Device 2 LMP L2CAP Data link L2CAP LMP Baseband Physical Baseband TDD, frequency hopping physical layer Device inquiry and paging Two types of links: SCO and ACL links Multiple packet types (multiple data rates with and without FEC)

Link Manager Protocol Applications IP SDP RFCOMM Data L2CAP Audio Link Manager Control LMP Setup and management of Baseband connections Baseband RF Piconet Management Link Configuration Security

Piconet Management Attach and detach slaves Master-slave switch Establishing SCO links Handling of low power modes ( Sniff, Hold, Park) Paging m s s s Master req response Slave

Low power mode (hold) Hold offset Slave Master Hold duration

Low power mode (Sniff) Sniff offset Sniff duration Slave Sniff period Master Traffic reduced to periodic sniff slots

Slave Low power mode (Park) Beacon instant Master Beacon interval Power saving + keep more than 7 slaves in a piconet Give up active member address, yet maintain synchronization Communication via broadcast LMP messages

Cluster Network Architecture (UCLA-WAMIS) Concept create a cluster based TDM infrastructure which: Approach (a) enables guaranteed bandwidth for voice/video (b) can support mobility distributed clustering algorithm time division slotting within each cluster slot reservation for real time traffic virtual circuits for real traffic; datagrams for data code separation across clusters slot synchronization Combines cellular radio and traditional packet radio features.

Lowest-ID cluster-head election 10 5 2 8 9 3 1 6 4 7

Distributed Cluster algorithm (lowest-id) B A G H C Each node is assigned a distinct ID. Periodically, the node broadcast the list of nodes that it can hear. ClusterHead hears only nodes with ID higher that itself (unless lower ID specifically gives up its role as CH) fi A,B,C Gateway hears two or more CHs fi G,H Ordinary node otherwise fi Properties No cluster heads are directly linked. In a cluster, any two nodes are at most two-hops away, since the CH is directly linked to any other node in the cluster. RE: Emphremides, et al A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling Proceedings of IEEE, Vol. 75, No.1, 1987

Cluster network architecture Dynamic, distributed clustering alg. partitions the system into clusters. Code separation among clusters. Local coordination provided within a cluster. Clusterhead acts as local coordinator to resolve channel scheduling provide power measurement/control support virtual circuit setup for real time (voice and video) traffic maintain synchronization Dynamic adaptation (via periodic updates) mobility failures Interference bandwidth requirements (B/W alloc.--tdma slot assgn.)

Channel Access Within each cluster: time-slotted frame frame.. control phase fixed TDMA on common code at full power data phase Control Phase: clustering algorithm routing power measurement and control code and slot assignment VC setup acknowledgments Data Phase: voice/video (PRMA) data (Random Access)

Virtual Circuit support in WAMIS Multimedia Traffic (eg, voice, video): connection oriented; QoS based admission control VC based bandwidth allocation We need: robust, QoS enabled routing elastic, reconfigurable VCs

VC reconfiguration in Mobile Environment Conventional VC setup does not work (path breaks up too frequently) Proposed approach: Fast Reservations, like in PRMA (Packet Reservation Multi Access) new path X old path Packet follow shortest path First packet reserves the slot(s) along the path When path changes, first packet competes again for slots on new path (voice/video rate reduced by low priority pkt drop) If no path, packet is dropped reservation released if slot is unused

Case study: compare Random Access and TDMA in Multimedia C. Richard Lin and Mario Gerla Computer Science Department University of California, Los Angeles

CSMA : DARPA PRNET (1970 s) Single channel Spatial reuse CSMA Implicit ACK (echo ACK) Retransmission (for datagramsonly) Duct routing (for voice traffic) Based on Bellman-Ford routing Alternate routing: multiple paths used to carry multiple copies of a real-time packet to improve reliability Carrier sense will limit the fan-out

Limitation of PRNET no bandwidth reservations; no access control (for voice) hidden terminal problem Enter Cluster TDMA (1994) different codes in each cluster TDMA type MAC access in each cluster QoS routing; bdw reservation; access control Fast VC set up (soft state)

Problems of CLUSTER TDMA: cost and complexity global slot synchronization multiple codes initialization Enter MACA/PR (1996) (Multiple Access Collision Avoidance/Packet Reservations) no clustering; single code; easy initialization RTS/CTS dialog (to prevent hidden terminal problems) Packet Reservations (to support real time traffic) QoS routing; standby routs (for dynamic rerouting)

MACA/PR (cont d)

Real Time Traffic Support: Bandwidth Reservation 1st packet is treated as a datagram packet After 1 st successful transmission: piggyback reservation is honored for subsequent packets Bounded delay and no collision Real -time Traffic and datagram traffic are interleaved (with datagram deferring to real-time traffic)

Performance Comparison (parameters) A 100X100 feet area Number of radio station=20 Frame size =100ms Tx range =40 feet VC end-to-end hop distance=3 Maximum speed=8 feet/sec Data rate=800kbps Pkt size=4kbits; pkt acquisition=500bits Multiple VCs,datagram background traffic Tx rate = 1pkt/frame Call duration=180 seconds.

Performance Comparison of Various Schemes Synchronous Asynchronous Cluster TDMA Cluster Token MACA/PR PRNET Global synchronization Cluster synchronization Session synchronization No synchronization

Overall Performance Comparison PRNET No bandwidth reservation No acceptance control In heavy load: duct routing generates excessive number of requests for alternate routes ( congestion) MACA/PR total VC throughput limited by lack of cluster/code separation Cluster TOKEN and TDMA high end to end delay due to token/tdma latency

Channel Propagation Models Radio channel propagation is characterized by three main parameters: Attenuation: free space loss, absorption by foliage, partitions Shadowing: obstacles between transmitter and receiver Multipath: due to the different phases on different paths

Simulator : Glomosim Channel Model Channel Fading Model in Glomosim Simulator the Simulator utilizes the SIRCIM impulse response parameters to characterize the radio propagation model, i.e.: multipath, shadowing effect, spatial correlation

Radio Channel Simulation

VC Performance: free space vs fading model