WirelessHART Modeling and Performance Evaluation
|
|
- Marianna Pope
- 5 years ago
- Views:
Transcription
1 WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
2 WirelessHART [ A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
3 Introduction Control applications switch from wired communication to Wireless reduced installation costs and increased flexibility can be adapted during runtime involves multiple communication hops Challenge is the predictability! Recent work by Alur, Pappas et al. introduces formal syntax and semantics for multi-hop WirelessHart different kinds of link failure models sufficient conditions for stability in control loop if only single link fails A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
4 Introduction Control applications switch from wired communication to Wireless reduced installation costs and increased flexibility can be adapted during runtime involves multiple communication hops Challenge is the predictability! Recent work by Alur, Pappas et al. introduces formal syntax and semantics for multi-hop WirelessHart different kinds of link failure models sufficient conditions for stability in control loop if only single link fails A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
5 This work Proposes to separate failure model from control analysis allows to consider the possible failure of all involved links Computes reachability probabilities for certain messages, paths or networks evaluates influence of different parameters takes into account different failure models could be included into control analysis directly A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
6 This work Proposes to separate failure model from control analysis allows to consider the possible failure of all involved links Computes reachability probabilities for certain messages, paths or networks evaluates influence of different parameters takes into account different failure models could be included into control analysis directly A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
7 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
8 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
9 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
10 WirelessHART protocol feedback control field devices are source and relay nodes gateway is routing destination pseudo-random frequency channel hopping and channel blacklisting to avoid channel overlaping and to reduce interference network layer determines routing upstream and downstream graph routing data link layer defines strict 10 ms time slots Time Division Multiple Access (TDMA) for collision-free and deterministic communications one transmission per slot MAC layer is slotted and synchronized series of consecutive slots forms super-frame A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
11 Radio connectivity graph Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
12 Model information flow Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 Static routing v 1 v 4 controller, v 2 v 5 controller, v 3 v 6 v 7 controller Communication schedule with superframe of size 7 η = ( v 1, v 4, v 2, v 5, v 3, v 6, v 4, c, v 5, c, v 6, v 7, v 7, c ). A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
13 Model information flow Wireless Control Netowork Plant s1 a1 s2 a2 v1 v2 v4 v5 controller s3 a3 v3 v6 v7 Static routing v 1 v 4 controller, v 2 v 5 controller, v 3 v 6 v 7 controller Communication schedule with superframe of size 7 η = ( v 1, v 4, v 2, v 5, v 3, v 6, v 4, c, v 5, c, v 6, v 7, v 7, c ). A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
14 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
15 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
16 WirelessHART parameters Super-frame all field nodes share the same super-frame of size (F s ) slots are specifically allocated to field devices to transmit uplink/downlink Reporting interval frequency at which measurements are taken and communicated (I s ) reduced frequency saves wireless communiciation overhead and extends life-time of field devices Message life cycle Time-to-Live (TTL) defines message life time TTL is decreased with each slot (uplink OR downlink) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
17 Hierarchical path model Information flow each flow periodically generates packets at source passes it through to its destination Time-triggered nature of the protocol iterate through slots of superframe and schedule possible transitions idle slot (if communication schedule does not allow a transmission) successful or unsuccessful transmission Compositional model per path state reflects age of the message at each hop (age 1, age 2,..., age n ) unique initial state (1, 0, 0,..., 0) allows to include failure probabilities A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
18 Hierarchical path model Information flow each flow periodically generates packets at source passes it through to its destination Time-triggered nature of the protocol iterate through slots of superframe and schedule possible transitions idle slot (if communication schedule does not allow a transmission) successful or unsuccessful transmission Compositional model per path state reflects age of the message at each hop (age 1, age 2,..., age n ) unique initial state (1, 0, 0,..., 0) allows to include failure probabilities A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
19 Underlying link model for transient failures p fl 1-p fl UP DOWN 1-p rc p rc successful transmission of each bit with probability 1 BER for WirelessHART message with L bits results in failure proability of p fl = 1 (1 BER) L recovery p rc = 0.9 for transient failures For links in transient state: For links in steady-state: [p s (t), p f (t)] = p(t) = p(0) [ ] t 1 pfl p fl p rc 1 p rc p rc p fl [p s, p f ] = [π(up), π(down)] = [, ] p rc + p fl p rc + p fl A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
20 Underlying link model for transient failures p fl 1-p fl UP DOWN 1-p rc p rc successful transmission of each bit with probability 1 BER for WirelessHART message with L bits results in failure proability of p fl = 1 (1 BER) L recovery p rc = 0.9 for transient failures For links in transient state: For links in steady-state: [p s (t), p f (t)] = p(t) = p(0) [ ] t 1 pfl p fl p rc 1 p rc p rc p fl [p s, p f ] = [π(up), π(down)] = [, ] p rc + p fl p rc + p fl A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
21 Example DTMC for 3-hop path Reporting interval is I s = 1, uplink frame-size F up = 7 and communication schedule η = (, n 1, n 2,,, n 2, n 3,, n 3, G ) R7 p s3 1 6,6,6 7,7,7 p s ,3,- 4,4,- 5,5,- 6,6,- 1 7,7,- 1 1,-,- 2,-,- 3,-, ,-,- 5,-,- 6,-,- 1 7,-,- p f1 p s2 p f2 1 1 p f3 Discard A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
22 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
23 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
24 Predictability measures Reachability probability that message generated at source reaches gateway before end of given reporting interval Delay time difference between T born and T rec, which equals the age of a message delay distribution τ can be derived from transient distribution of the DTMC Utilization indicates fraction of slots that transmitted irrespective of success directly relates to network communication overhead and power consumption A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
25 Typcial WirelessHART network Real plant settings according to HART Communication Foundation 30% of nodes communicate directly with gateway access points about 50% are two hops away remaining 20% may be 3 or 4 hops away Link layer availability WirelessHART MAC layer payload length is 127 bytes for BER = it follows p fl = and π(up) = A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
26 Typcial WirelessHART network Real plant settings according to HART Communication Foundation 30% of nodes communicate directly with gateway access points about 50% are two hops away remaining 20% may be 3 or 4 hops away Link layer availability WirelessHART MAC layer payload length is 127 bytes for BER = it follows p fl = and π(up) = A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
27 Connectivity graph of a typcial WirelessHART network A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
28 Connectivity graph of a typcial WirelessHART network Parameters reporting interval is 4 superframe size for uplink is 20 η a = ( n1, G, n2, G, n3, G, n4, n1, n1, G, n5, n1, n1, G, n6, n2, n2, G, n7, n3, n3, G, n8, n3, n3, G, n9, n6, n6, n2, n2, G, n10, n7, n7, n3, n3, G ) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
29 Robustness against transient link failures transient UP probability steady state probability when p =0.184 fl transient UP probability when p =0.184 fl steady state probability when p fl =0.05 transient UP probability when p fl = Time slot A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
30 Reachability Table: The reachability probabilities with a link failure lasting one cycle Path number Hop number Reachability (%) without link failure with link failure Bottleneck The longest path with the lowest availability forms the bottleneck of the system. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
31 Reachability Table: The reachability probabilities with a link failure lasting one cycle Path number Hop number Reachability (%) without link failure with link failure Bottleneck The longest path with the lowest availability forms the bottleneck of the system. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
32 Utilization Table: Influence of π(up) on the utilization rate of the example network Link availability Utilization rate Bad links not only degrade the control stability but also introduce more communication overhead and power consumption. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
33 Utilization Table: Influence of π(up) on the utilization rate of the example network Link availability Utilization rate Bad links not only degrade the control stability but also introduce more communication overhead and power consumption. A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
34 Overall delay distribution probability delay (ms) A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
35 Expected delays with different schedules Schedule η a X= 10 Y= Schedule η b X= 7 Y= expected delays (ms) path A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
36 Reachability probabilities with I s = 2 and I s = 4 A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
37 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
38 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
39 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
40 Conclusions WirelessHart is able to deliver reliable service under typical industrial environments important to choose parameters appropriate to achieve stable control Contribution Tool to automatically derive the DTMC for a specific network, communication schedule, routing graph, and reporting interval and to compute predictability measures reachability delay distribution utilization A. Remke and X. Wu (University of Twente) WirelessHART October 24, / 21
Mathematical Problems in Networked Embedded Systems
Mathematical Problems in Networked Embedded Systems Miklós Maróti Institute for Software Integrated Systems Vanderbilt University Outline Acoustic ranging TDMA in globally asynchronous locally synchronous
More informationDesign of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee
Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization
More informationMAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS
MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Imran Yousaf Master s Degree Thesis 2011 EMBEDDED SYSTEMS MAC SCHEDULING IN INDUSTRIAL WIRELESS CELL-BASED MESH SENSOR NETWORKS Postadress:
More informationCOSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section B
MAC: Scheduled Approaches 1. Reservation Systems 2. Polling Systems 3. Token Passing Systems Static Channelization: TDMA and FDMA COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationPolitecnico di Milano Facoltà di Ingegneria dell Informazione. 3 Basic concepts. Wireless Networks Prof. Antonio Capone
Politecnico di Milano Facoltà di Ingegneria dell Informazione 3 Basic concepts Wireless Networks Prof. Antonio Capone Wireless Networks Wireless or wired, what is better? Well, it depends on the situation!
More informationolsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra
olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work
More informationEnergy-Efficient Communication Protocol for Wireless Microsensor Networks
Energy-Efficient Communication Protocol for Wireless Microsensor Networks Wendi Rabiner Heinzelman Anatha Chandrasakan Hari Balakrishnan Massachusetts Institute of Technology Presented by Rick Skowyra
More informationMultiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access
More informationGrundlagen der Rechnernetze. Introduction
Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction
More informationInternet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours
Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationWireless in the Real World. Principles
Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationSELF OPTIMIZING NETWORKS
SELF OPTIMIZING NETWORKS An LTE network is controlled by a network management system of a wide range of functions, e.g. sets the parameters that the network elements are using manages their software detects
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationDistributed Control-as-a-Service with Wireless Swarm Systems"
Distributed Control-as-a-Service with Wireless Swarm Systems" Prof. Rahul Mangharam Director, Real-Time & Embedded Systems Lab Dept. Electrical & Systems Engineering Dept. Computer & Information Science
More informationUNIK4230: Mobile Communications. Abul Kaosher
UNIK4230: Mobile Communications Abul Kaosher abul.kaosher@nsn.com Multiple Access Multiple Access Introduction FDMA (Frequency Division Multiple Access) TDMA (Time Division Multiple Access) CDMA (Code
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationInterference management Within 3GPP LTE advanced
Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction
More informationMultiplexing Module W.tra.2
Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at
More informationA Wireless Communication System using Multicasting with an Acknowledgement Mark
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an
More informationMultiple Access Techniques for Wireless Communications
Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division
More informationMedium Access Control Protocol for WBANS
Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee
More informationPolitecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. Physical layer. Fundamentals of Communication Networks
Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione Physical layer Fundamentals of Communication Networks 1 Disclaimer o The basics of signal characterization (in time and frequency
More informationUTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER
UTILIZATION OF AN IEEE 1588 TIMING REFERENCE SOURCE IN THE inet RF TRANSCEIVER Dr. Cheng Lu, Chief Communications System Engineer John Roach, Vice President, Network Products Division Dr. George Sasvari,
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationDynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET
Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced
More informationEvaluation of the 6TiSCH Network Formation
Evaluation of the 6TiSCH Network Formation Dario Fanucchi 1 Barbara Staehle 2 Rudi Knorr 1,3 1 Department of Computer Science University of Augsburg, Germany 2 Department of Computer Science University
More informationLTE systems: overview
LTE systems: overview Luca Reggiani LTE overview 1 Outline 1. Standard status 2. Signal structure 3. Signal generation 4. Physical layer procedures 5. System architecture 6. References LTE overview 2 Standard
More informationECS455: Chapter 4 Multiple Access
ECS455: Chapter 4 Multiple Access Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 1 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 ECS455: Chapter 4 Multiple
More informationDependable Wireless Control
Dependable Wireless Control through Cyber-Physical Co-Design Chenyang Lu Cyber-Physical Systems Laboratory Department of Computer Science and Engineering Wireless for Process Automa1on Emerson 5.9+ billion
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationData Dissemination in Wireless Sensor Networks
Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks
More informationAgenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime
CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A
More informationCROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS
CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationQ&A. Fragmentation EMAC HIMAC PHY. EMAC frames with the same HINOC destination address are combined into a HIMAC data frame
Q&A 1 2 3 4 5 EMAC HIMAC1 HIMAC2 HIMAC Fragmentation FEC1 FEC2 PHY EMAC frames with the same HINOC destination address are combined into a HIMAC data frame One (or several) HIMAC data frame is carried
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationWireless TDMA Mesh Networks
Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationLecture 8 Mul+user Systems
Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationInternet of Things - Exercises. Matteo Cesana
Internet of Things - Exercises Matteo Cesana December 16, 2016 Contents 1 Exercises on Energy Consumption 2 2 Exercises on IEEE 802.15.4 Standard 26 3 Exercises on Medium Access Control Solutions 59 4
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More informationSYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION
Model name: M200I-RF Introduction: The 200 Series Commercial RF System is designed for use with compatible intelligent fire systems using the System Sensor 200/500 Series CLIP, Enhanced and Advanced communication
More informationContents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure
Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationWiMedia Interoperability and Beaconing Protocol
and Beaconing Protocol Mike Micheletti UWB & Wireless USB Product Manager LeCroy Protocol Solutions Group T he WiMedia Alliance s ultra wideband wireless architecture is designed to handle multiple protocols
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationFunneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks
Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell Se Gi Hong, Francesca Cuomo EE Dept., Columbia University CS
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationSC - Single carrier systems One carrier carries data stream
Digital modulation SC - Single carrier systems One carrier carries data stream MC - Multi-carrier systems Many carriers are used for data transmission. Data stream is divided into sub-streams and each
More informationBy Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor
Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings
More informationLink-state protocols and Open Shortest Path First (OSPF)
Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic
More informationLattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology
Lattice Throughput Optimal Scheduling: Learning Contention Patterns and Adapting to Load/Topology Yung Yi, Gustavo de Veciana, and Sanjay Shakkottai Abstract Aggregate traffic loads and topology in multi-hop
More informationAdaptation of MAC Layer for QoS in WSN
Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types
More informationIEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OFDM sub-channelization improvement and system performance selected topics 2002-11-14 Source(s)
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More information3G TS V2.0.0 ( )
3GPP TSG R1#7(99) e25 3G TS 25.224 V2.0.0 (1999-09) Reference Technical Specification 3 rd Generation Partnership Project (3GPP); Technical Specification Group Radio Access Network; Physical Layer Procedures
More informationWireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale
Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks
More informationComputer Networks II Advanced Features (T )
Computer Networks II Advanced Features (T-110.5111) Wireless Sensor Networks, PhD Postdoctoral Researcher DCS Research Group For classroom use only, no unauthorized distribution Wireless sensor networks:
More informationBackground: Cellular network technology
Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)
More informationReliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points
Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationPerformance Analysis of Time-Critical Peer-to-Peer Communications in IEEE Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC proceedings Performance Analysis of Time-Critical Peer-to-Peer
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationMultiple Access Techniques
Multiple Access Techniques Instructor: Prof. Dr. Noor M. Khan Department of Electrical Engineering, Faculty of Engineering, Mohammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +92
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationLower Layers PART1: IEEE and the ZOLERTIA Z1 Radio
Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission
More informationMACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II
MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II BASICS & CHALLENGES Dr Konstantinos Dimou Senior Research Engineer Ericsson Research konstantinos.dimou@ericsson.com Overview Introduction Definition Vision
More informationData and Computer Communications. Tenth Edition by William Stallings
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education, 2013 CHAPTER 8 Multiplexing It was impossible
More informationEECS 122: Introduction to Computer Networks Encoding and Framing. Questions
EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationReti di Telecomunicazione. Channels and Multiplexing
Reti di Telecomunicazione Channels and Multiplexing Point-to-point Channels They are permanent connections between a sender and a receiver The receiver can be designed and optimized based on the (only)
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationWIRELESS body area networks (WBANs) consist of a
IEEE SYSTEMS JOURNAL 1 Improving Reliability of Emergency Data Frame Transmission in IEEE 80.15.6 Wireless Body Area Networks Kayiparambil S. Deepak and Anchare V. Babu Abstract Wireless body area networks
More informationLeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide. Introduction
LeCroy UWBSpekChek WiMedia Compliance Test Suite User Guide Version 3.10 March, 2008 Introduction LeCroy UWBSpekChek Application The UWBSpekChek application operates in conjunction with the UWBTracer/Trainer
More informationData and Computer Communications. Tenth Edition by William Stallings
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2013 CHAPTER 8 Multiplexing
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationMedium Access Control
CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationSensitivity Analysis of EADARP Multicast Protocol
www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract
More informationOne Cell Reuse OFDM/TDMA using. broadband wireless access systems
One Cell Reuse OFDM/TDMA using subcarrier level adaptive modulation for broadband wireless access systems Seiichi Sampei Department of Information and Communications Technology, Osaka University Outlines
More informationSensor Network Platforms and Tools
Sensor Network Platforms and Tools 1 AN OVERVIEW OF SENSOR NODES AND THEIR COMPONENTS References 2 Sensor Node Architecture 3 1 Main components of a sensor node 4 A controller Communication device(s) Sensor(s)/actuator(s)
More informationFree space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.
Signal Propagation and Power Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f P rcv P snd 1 d 2 f 2 quadratic decrease in distance
More informationChannel partitioning protocols
Wireless Networks a.y. 2010-2011 Channel partitioning protocols Giacinto Gelli DIBET gelli@unina.it 1 Outline Introduction Duplexing techniques FDD TDD Channel partitioning techniques FDMA TDMA CDMA Hybrid
More informationOn the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study
On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study Beatrice Tomasi, Prof. James C. Preisig, Prof. Michele Zorzi Objectives and motivations Underwater
More informationCooperative Coexistence of BLE and Time Slotted Channel Hopping Networks
Cooperative Coexistence of and Time Slotted Channel Hopping Networks Onur Carhacioglu, Pouria Zand, Majid Nabi Holst Centre / IMEC-NL, High Tech Campus 3, 5656 AE Eindhoven, The Netherlands Department
More informationWIDESTAR II Satellite Base Station Equipment
WIDESTAR II Satellite Base Station Equipment Satellite Base Station Higher Data Communications Speed VoIP Transition Special Articles on WIDESTAR II High-speed Mobile Satellite Communications Service for
More informationT325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.
T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:
More information