Professional Documents
Culture Documents
ABSTRACT
Wireless communication has been successfully used in a variety of mobile applications, including those with real-time
requirements. In such systems, timing guarantees are normally obtained by using a TDMA-based Medium Access
Control (MAC) protocol, relying in a coordinator node in
charge of time-slots allocation. However, certain applications cannot make use of such coordinator because it simply
does not exist, normally due to restrictions in the operation
environment. To solve this problem we present in this paper
a MAC protocol that operates without a central coordinator
and also without any global information, with no previous
assignments of roles to nodes nor resource reservations. Our
proposed Hybrid Contention/TDMA-based (HCT) MAC is
specially designed to work with ad-hoc wireless networks organized in clusters. The HCT MAC is designed for providing
timely bounded communication both inside and outside the
clusters. This paper presents a detailed description of HCT,
including an analytical analysis of the expected performance
of the protocol. Moreover, experimental results obtained by
simulation are also shown.
Keywords
Wireless communication networks, real-time communication,
medium access control, mobile systems
1.
INTRODUCTION
Currently there is an increasing interest on applications composed by autonomous and cooperative mobile devices, such
as ad-hoc car-to-car systems [2]. These applications are
formed by a variable number of mobile nodes with dynamic
The allocation of time-slots by means of competition between nodes is a strategy present in other protocols, for instance in PRMA, D-TDMA, RAMA, and DRMA [6]. Nevertheless, these protocols were proposed to conciliate mainly
data and voice traffic, where messages are sent in bursts,
without taking into account the recurrence of transmissions.
These conditions are not suited for the periodic nature of the
control messages exchanged by autonomous mobile nodes.
The reminder of this paper is structured as follows: section
2 introduces the HCT protocol, detailing how to divide the
medium access time among nodes. Section 3 performs an
analytical analysis of the expected time for slot assignment
and demonstrates the feasibility of the method. Finally,
section 4 concludes the paper and points out some future
directions for our work.
2.
2.1
We assume that each cluster has a special node called clusterhead. It is the single node allowed to transmit and receive
messages outside the cluster. In the proposed MAC, it has
the important role to help the allocation of slots, to synchronize the other nodes transmissions, and to put the whole
cluster in transmission or waiting (silence) mode.
The cluster remains in silence until its cluster-head starts
a superframe. The superframe is delimited by two special
frames sent by the cluster-head, as shown in figure 2: a start
beacon (SB), and a finish beacon (FB). The start beacon
contains a map with the allocation states of the time slots
of the superframe, and thus reports which slots are idle. The
finish beacon contains an acknowledge map to report which
time-slots contained valid frames, according to the cluster-
2.2
head.
A node that needs to allocate a time-slot must wait for the
start beacon to become aware of which slots are idle. Afterwards, it chooses randomly a slot among the available ones,
and uses it to transmit a frame. Then it waits for the finish
beacon and looks in the acknowledge map if the cluster-head
recognized a valid transmission in that slot. If this holds,
it is because no other node tried to use it, meaning it allocated the time-slot. Otherwise there would be a collision,
and no valid frame would be seen by the cluster-head. If the
cluster-head did not acknowledge that time-slot, the node
must repeat the procedure in the next superframe. The release of a time-slot can be performed explicitly, when its
owner node sends a control frame within it, or implicitly,
when the cluster-head detects it has not being used for a
certain number of rounds. In both cases, as soon as the
time-slot is released, the cluster-head reports it as idle in
the next round.
Clock synchronization is needed to identify time-slots with
acceptable precision. Therefore, the start of a superframe
is used by the nodes to synchronize their clocks. Actually,
the reception of the SB frame resets the TDMA clock in a
node, assuring that the related timer will fire at the correct
times. The uncertainty t on the local clock of each node is
), plus its
given by the delay for reception of the SB frame ( D
c
processing time (tproc ) and the local clock resolution (ttick ).
This can be seen in equation 1 (considering that the nodes
are homogeneous, thus tproc and ttick are the same for every
node):
t =
D
+ tproc + ttick
c
(1)
D: cluster radius
c: speed of light
tproc : processing time at reception
Therefore, the duration of a time slot (tslot ) must include
this maximum uncertainty, expressed in equation 1:
tslot =
Lmax
+ tmax
B
(2)
k. Lmax
k
1
B
=
.
(n + 2).tslot
n + 2 1 + L B .t
max
(3)
As reported in the previous subsection, the MAC for transmissions inside the cluster relies on the cluster-head both to
report idle slots to member stations and to acknowledge the
successful allocation of time-slots. For this reason, the previous analysis ignored possible neighbor clusters. However,
when there is more than one cluster in the range of transmissions, what could be the case in the transmissions among
clusters, the problem of interference becomes eminent. Two
clusters can not transmit at the same time if they are reachable from each other, or if there is a third cluster in reach
of both of them. But if transmissions from two clusters do
not collide, there is no reason to forbid their simultaneous
transmissions.
In this scenario, the MAC for transmissions among clusters
is mainly responsible for allocating superframes to clusters in
an efficient manner. There are some key details that differs
it from the intra-cluster case, as follows: i) the clock synchronization is expected to be rougher; and ii) there is no
single cluster-head to acknowledge transmissions. Regarding issue i), the time frames allocated to clusters (called
superframes in the protocol) are significantly bigger than
the time-slots allocated to nodes. Therefore the delimitation of these superframes can tolerate a longer jitter caused
by a rougher clock synchronization (parameter ttick ). On
the other hand, issue ii) states that each cluster must discover by himself which are the idle superframes (as it needs
to do an allocation), and if its neighbors are aware of its superframe allocation. This is also a kind of consensus problem, because the cluster relies on its neighbors to detect idle
supreframes and also to acknowledge its allocation. Nevertheless, the main problem here is to find out the intersection
of the views from the neighbors clusters, working as follows.
When an idle superframe is needed, the cluster looks for
superframes reported to be idle by all neighbors, along one
round. Afterwards it tries to allocate an idle superframe
by sending a message and then waiting for the acknowledgments from all neighbors, which must be received within one
round. Information about idle superframes and acknowledgments are piggybacked in the beacons of superframes. This
protocol forbids that two potentially interfering clusters allocate the same superframes but, on the other hand, it allows
two non-interfering clusters to share superframes, enhancing
their performance.
3. PERFORMANCE EVALUATION
Given that both time-slot and superframe allocation are performed by an algorithm with a random stage, it is necessary
to investigate the convergence of this allocation procedure.
Therefore, we derived a formulation that allows to calculate the probability distribution of the number of rounds
necessary for an allocation to stabilize. To calculate this
distribution, one must know the probability of each number
of time slots to be allocated in one round. If n is the number
of idle slots, and k is the number of needed slots, one must
determine the probability of j slots being allocated in one
round, given by Pj (n, k), j [0, k].
To calculate these probabilities, firstly it is needed a combinatorial analysis of the n idle time slots and k slots to
allocate. Equation 4 gives the number Nj (n, k) of possible
combinations of k independent selections inside the set of n
n!
(nk)!
A(n, k) = nk
Equation 4 is suitable for a scenario where k nodes try each
to allocate one slot. Once collisions are possible between
any pair of slot selections, this equation represents the worst
case scenario for allocating k slots. However, if a node tries
to allocate more than one slot than the total number of
possible collisions decreases. But even in such situation, the
iterations trend to converge to the scenario where each node
tries to allocate only one slot. This happens due to the
partial allocations of the required slots for each node during
the iterations (e.g. a node needs three slots, but a collision
occurs for one of them, then in the next round it will try to
allocate only one slot).
Nj (n, k)
, j [0, k]
A(n, k)
(5)
To obtain the probabilities of the number of rounds to allocate all k slots, all possible sequences of results must be
enumerated. Each sequence represents the results of consecutive rounds, until all k slots are allocated. Let Sm (n, k) be
a sequence of results, obtained by successive rounds when
nodes try to allocate k slots, defined by equation 6.
Sm (n, k) = {Pji (ni , ki )}
(6)
(i, ji ) N2 ji [0, ki ]
ki = ki1 ji1 ki > 0
ni = ni1 ji1
n0 = n, k0 = k
Figure 4: Number of rounds to stabilize the allocation, with confidence degree of 99%
4.
5. REFERENCES
[1] I. e. a. Akyldiz. Wireless mesh networks: a survey.
Computer Networks, 47(4):445487, March 2005.
[2] W. Chen and S. Cai. Ad hoc peer-to-peer network
architecture for vehicle safety communications.
Communications Magazine, IEEE, 43(4):100107, 2005.
[3] R. Cunningham and V. Cahill. Time bounded medium
access control for ad hoc networks. In POMC 02:
Proceedings of the second ACM international workshop
on Principles of mobile computing, pages 18, New
York, NY, USA, 2002. ACM Press.
[4] B. Huber and W. Elmenreich. Wireless time-triggered
real-time communication. In Proceedings of the 2nd
Workshop on Intelligent Solutions in Embedded
Systems, Graz, Austria, Jun. 2004.
[5] S. Kumar, V. S. Raghavan, and J. Deng. Medium
access control protocols for ad hoc wireless networks: A
survey. Ad Hoc Networks, 4(3):326358, 2006.
[6] X. Qiu and V. O. K. Li. Dynamic reservation multiple
access (drma): a new multiple access scheme for
personal communication systems (pcs). Wirel. Netw.,
2(2):117128, 1996.
[7] H.-J. R. Reumerman and M. M. Ruffini. The
application-based clustering concept and requirements
for intervehicle networks. Communications Magazine,
IEEE, 43(4):108113, 2005.