Image   Prioritized Medium Access Control

Page History: Overview


Compare Page Revisions



« Older Revision - Back to Page History - Newer Revision »


Page Revision: 2007/05/25 17:15


A prioritized Medium Access Control (MAC) grants the right to access to the computer node with the highest priority. Such a protocol was originally created for wireline networks; Controller Area Networks (CAN) is the most known one and it is currently deployed in 700 million units. We are tranferring this idea to the wireless domain and exploring this idea to solve problems in real-time communication and collaborative distributed computing (wireless/line sensor networks and cyber-physical systems).

§§§EditSectionPlaceHolder§§§

WiDOM

Image


WiDom is a prioritized MAC protocol for wireless networks. It is an adaptation of the dominance protocols (used in the CAN bus) to a wireless channel and perform a schedulability analysis. The main idea of our dominance protocol is that a message stream is assigned a static priority and when message streams contend for the channel, they perform a tournament such that the highest-priority message is granted access to the channel.

The Tournament The tournament is performed bit-by-bit, starting with the most significant bit. A bit is assigned a time interval. If a node contends with a dominant bit then a carrier wave is transmitted in this time interval; if the node contends with a recessive bit, it transmits nothing but listens. This makes it possible for a node with a recessive bit to detect that another node has transmitted a dominant bit, and hence the node with the recessive bit withdraws.



§§§EditSectionPlaceHolder§§§

WiDOM-MBD



WiDom is a prioritized MAC protocol for wireless networks where a single broadcast does not reach all computer nodes.

§§§EditSectionPlaceHolder§§§

WiDOM-MC



We are exploring a prioritized MAC protocol for wireless networks that that offers several channels.

§§§EditSectionPlaceHolder§§§

Data Aggregation



Prioritized MAC protocol can be used to efficiently compute aggregated quantities (such as MIN, MAX) of sensor readings.

§§§EditSectionPlaceHolder§§§

Data Dissemination



Prioritized MAC protocol can be used to efficiently disseminate data when the topology is unknown.

§§§EditSectionPlaceHolder§§§

WISHES



We are exploring how to use multi-channel capability together with a prioritized MAC protocol to deal with the well-known hidden node problem.



Create a new Page ¦ All Pages ¦ Categories ¦ Administration ¦ File Management ¦ Login/Logout



Powered By ScrewTurn Wiki.