1 / 20

Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE 802.11

Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE 802.11. Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Variaya. Automated Vehicle Platoon. Real-time safety critical control over ad-hoc network Vehicles transmit control data in round robin every 20 ms

izzy
Download Presentation

Wireless Token Ring Protocol (WTRP) Performance Comparison with IEEE 802.11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Token Ring Protocol (WTRP)Performance Comparison with IEEE 802.11 Mustafa Ergen, Duke Lee, Raja Sengupta, Pravin Variaya

  2. Automated Vehicle Platoon Real-time safety critical control over ad-hoc network Vehicles transmit control data in round robin every 20 ms Wireless Quality of Service

  3. Motivations for WTRP • Quality of service (real time applications) • Distributed solution (robust against a single node failure) • Flexible topology (token ring can be created with Pico cells) • Safety critical applications (need fast recovery from failure) • No need for clock synchronization (compared to TDMA) • Partial connectivity (hidden terminal problem)

  4. Motivations for WTRP • Quality of service (real time applications) • Distributed solution (robust against a single node failure) • Flexible topology (token ring can be created with Pico cells) • Safety critical applications (need fast recovery from failure) • No need for clock synchronization (compared to TDMA) • Works on partial connectivity (no hidden terminal problem)

  5. Motivations for WTRP • Quality of service (real time applications) • Distributed solution (robust against a single node failure) • Flexible topology (token ring can be created with Pico cells) • Safety critical applications (need fast recovery from failure) • No need for clock synchronization (compared to TDMA) • Works on partial connectivity (no hidden terminal problem) centralized (802.11 PCF, Bluetooth) distributed (token ring)

  6. Motivations for WTRP • Quality of service (real time applications) • Distributed solution (robust against a single node failure) • Flexible topology (token ring can be created with Pico cells) • Safety critical applications (need fast recovery from failure) • No need for clock synchronization (compared to TDMA) • Works on partial connectivity (no hidden terminal problem) 1 2 3 4 1 TDMA

  7. Motivations for WTRP • Quality of service (real time applications) • Distributed solution (robust against a single node failure) • Flexible topology (token ring can be created with Pico cells) • Safety critical applications (need fast recovery from failure) • No need for clock synchronization (compared to TDMA) • Works on partial connectivity (no hidden terminal problem)

  8. Additional Challenges From Wireless Medium • Partial connectivity (unable to hear all nodes in a ring) • Support for multiple rings • Self-managed admission control • Frequent packet loss, corruption

  9. The Wireless Token Ring Protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. • It supports quality of service in terms of bounded latency and reserved bandwidth. • The token passing defines the transmission order, and each token is forced to give up the token after a specified amount of time. • Each ring has unique ring id based on unique MAC address of one of the stations of the ring. (The station is called the owner of the ring). • When owner leaves the ring, another station elects itself to be the owner of the ring.

  10. Connectivity Table • Each node builds and updates connectivity table that contains information of all stations in its reception range, and transmission order of the nodes in its ring

  11. Unique Priority of Token • Based on ring address and generation sequence number pair. • Station only accept token that has higher priority than the last token that the station has accepted. ring address generation sequence … Implicit ACK ACK is thought to be received when the successor initiates a transmission or token.

  12. Invite Contend Token Token 1. SET_SUC C 2. SET_PRED A A C B F D E Descriptions (Operations) Joining: Stations periodically invite other nodes to join the ring by broadcasting the available resources left in the medium Leaving: When B wants to leave, it requests A to connect to its successor, C. If A does not have connection with C, then it connects to the next node in terms of the transmission order of the ring.

  13. C A B 6 2 6 2 F D 2 2 E 1. Retransmit TOKEN 6 6 6 2 2. SET_PRED A 2 6 6 6 6 Descriptions (Management) Ring RecoveryAble to recover quickly by keeping information about topology of the ring, recovers from multiple simultaneous faults by taking increasingly drastic actions Token Recovery Multiple token is deleted using unique priority of token based on generation sequence number and token ring address pair.

  14. WTRP

  15. IEEE 802.11

  16. Token Rotation Time A 3 A 1 A 2 C B C B C B

  17. Robustness

  18. Fairness

  19. Throughput

  20. Conclusions • The wireless token ring protocol (WTRP) is a medium access control protocol for wireless networks in mission critical systems. • It supports quality of service in terms of bounded latency and reserved bandwidth. • WTRP is efficient in the sense that it reduces the number of retransmissions due to collisions. • It is fair in the sense that each station takes a turn to transmit and is forced to give up the right to transmit after transmitting for a specified amount of time. • It is a distributed protocol that supports many topologies since not all stations need to be connected to each other or to a central station. • It can be used with an admission control agent for bandwidth or latency reservations. • WTRP is robust against single node failure. WTRP is designed to recover gracefully from multiple simultaneous faults.

More Related