25
Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Embed Size (px)

DESCRIPTION

Introduction In an unreliable medium, problem of providing QoS at the network layer using queuing and routing techniques is not sufficient. The centralized approach is suitable for networks where only the last hop is wireless.

Citation preview

Page 1: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Wireless Token Ring Protocol

Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis,

Pravin Varaiya SCI 2002

Page 2: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Outline Introduction Protocol overview Performance Comparison with the IEEE 802.11 in DCF

mode Conclusion

Page 3: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Introduction In an unreliable medium, problem of

providing QoS at the network layer using queuing and routing techniques is not sufficient.

The centralized approach is suitable for networks where only the last hop is wireless.

Page 4: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Introduction The advantages of a distributed medium

access control Roubstness against single node failure Support for flexible topologies Nodes can be partially connected and not all

nodes need to have a connection with a master. One of the biggest challenges that the

WTRP overcomes is partial connectivity.

Page 5: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview Special tokens, additional fields in the

tokens, and new timers are added to the protocol.

FC RA DA SA GenSeq Seq

1 6 6 6 4 4 bytes

Page 6: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview FC (Frame Control)

Token, Solicit Successor, Set Predecessor, etc. RA (Ring Address)

Refers to the ring to which the token belongs. DA (Destination Address) SA (Source Address)

Page 7: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview Seq (Sequence number)

Initialized to zero and incremented by every station that passes the token.

GenSeq (Generation Sequence Number) Initialized to zero and incremented at every

rotation of the token by the creator of the token.

Page 8: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview The connectivity manager resident on each

node tracks transmissions from its own ring and those from other nearby rings.

The connectivity table of the manager holds information about its ring.

Page 9: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview

Page 10: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview The Ring Owner is the station that has the

same MAC address as the ring address. Stations rely on implicit ACK to monitor the

success of their token transmissions. Each station resets its IDLE_TIMER

whenever it receives an implicit ACK.

Page 11: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview To resolve multiple tokens, the concept of

priority is used. The generation sequence number and the

ring address define the priority of a token. A token with a higher generation sequence

number has higher priority. If the generation sequence numbers of tokens

are the same, ring addresses of each token are used to break the tie.

Page 12: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview When a station receives a token with a

lower priority than itself, it deletes the token and notifies its predecessor without accepting the token.

Page 13: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview The ring recovery mechanism is invoked

when the monitoring node decides that its successor is unreachable.

Using the Connectivity Manager to quickly find the next connected node in the transmission order. Sends the SET_PREDECESSOR token to the

next connected node to close the ring.

Page 14: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview WTRP allows nodes to join a ring

dynamically, one at a time.

Page 15: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview Leave the ring.

Page 16: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview When the ring owner leaves the ring, the

successor of the owner claims the ring address and becomes the ring owner. To ensure that the ring owner is present in the

ring.

Page 17: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Protocol overview If a station receives a token without its

generation sequence number updated, it assumes that the ring owner is unreachable and it elects itself to be the ring owner.

Page 18: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Performance

Page 19: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Performance

Page 20: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Performance

Page 21: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Comparison with the IEEE802.11 in DCF mode The token ring protocol in

its current implementation is disadvantaged relative to the original IEEE 802.11 driver. The token ring protocol is

implemented on top of IEEE802.11 in DCF mode.

Page 22: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Comparison with the IEEE802.11 in DCF mode

Page 23: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Comparison with the IEEE802.11 in DCF mode

Page 24: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Comparison with the IEEE802.11 in DCF mode

Page 25: Wireless Token Ring Protocol Mustafa Ergen, Duke Lee, Roberto Attias, Anuj Puri, Raja Sengupta, Stavros Tripakis, Pravin Varaiya SCI 2002

Conclusion WTRP is efficient in the sense that it

reduces the number of retransmissions due to collisions.

Features such as bounded latency and robustness against multiple node failures are some of the reasons for this choice.