Exemplary embodiments pertain to the art of wireless communication.
Many systems include components or devices that must communicate with each other or a central controller, and, in many cases, that communication is wireless. Typically, contention-based protocols such as IEEE 802.15.11 and 802.15.4 are used to organize and prioritize the communication among the devices. These protocols provide random or non-deterministic access to radio frequency (RF) channels. As a result, a real-time stream of data may not be guaranteed. Other protocols (including IEEE 802.15.4) have contention-free mechanisms such as guaranteed time slot (GTS). GTS requires knowledge of the bandwidth requirement and limits the number of devices that may use GTS.
Disclosed is a system to implement a scheduling algorithm in a communication network using time division multiple access (TDMA) including a plurality of devices, each device transmitting a packet of data in the communication network; a memory device configured to store the scheduling algorithm; and a processor configured to execute the scheduling algorithm to form a deterministic packet scheduling scheme, the deterministic packet scheduling scheme being based on a base unit representing a minimum among maximum packet intervals corresponding to the plurality of devices in the communication network.
Also disclosed is a computer-implemented method of executing a deterministic scheduling algorithm in a communication network using time division multiple access (TDMA) including determining a maximum packet interval (MPI) for each device among a plurality of devices of the communication network; determining a base unit (BU) as a minimum MPI among the MPIs of the plurality of devices; and executing, using a processor, the deterministic scheduling algorithm based on the BU.
The following descriptions should not be considered limiting in any way. With reference to the accompanying drawings, like elements are numbered alike:
A detailed description of one or more embodiments of the disclosed apparatus and method are presented herein by way of exemplification and not limitation with reference to the Figures.
As noted above, devices within a system may implement wireless communication with each other or a central controller. Embodiments discussed herein specifically reference an avionic system for explanatory purposes, but the systems and methods discussed herein are not limited to any particular application. In the exemplary avionic system, wireless sensors and actuators may be among the devices that communicate wirelessly. Avionic systems must meet communication regulations and involve mission critical data that is not conducive to the contention-based protocols typically used in wireless communication systems. In avionic communication, each of the various devices must communicate with a central controller in a designated timeslot. Embodiments of the systems and methods described herein relate to a deterministic packet scheduling scheme for time division multiple access (TDMA) communication by devices in an exemplary aviation system.
The floor function (indicated by └ ┘) rounds MPI to the closest integer (greater than one) toward negative infinity (the smallest integer value greater than one) and computes MPI for each device 110 based on the Rp and Tlag of the device 110. Tpkt is assumed to be a constant and represents the time required, with all overheads included, to transmit Lpayload bytes, which is also assumed as a constant. Rpkt is given by:
Rphy is the raw data rate in the physical layer and Tpayload is the amount of time required to transmit Lpayload bytes (without considering overheads). While MPI is dimensionless, it expresses a distance with reference to number of packets based on the implied discretization in a packetized network. The MPI of a given device 110 sets an upper limit for access sharing with other devices 110 in the same system 100 (network). The use of MPI imposes a tighter boundary on bandwidth requirements than the use of the Rp and Tlag, because the implied data rate is higher than Rp or the implied latency is lower than Tlag or both.
At block 220, defining a base unit (BU) based on the MPI obtained for each device 110 using EQ. 1. BU is defined as the minimum MPI among the MPIs of the different devices 110:
M is the number of devices 110 in the network of the system 100. The use of the BU ensures that the resulting PR 410 satisfies the most restrictive bandwidth requirement among the devices 110 of the system 100. This is because the minimum MPI represents the smallest among the maximum allowable distances between two adjacent packets. As such, the BU represents a quantitative measure of how many additional packets may be accommodated once the most demanding communication has been met. At block 230, calculating a packet interval based on BU, referred to as PIB, for each device 110 is as follows:
Every PIB is an integer number larger than one and satisfies PIBm*BU≦MPIm. Every device 110 has a PIB associated with it, but two or more devices 110 may have the same PIB. By using the PIB, the length of a PR 410 can be increased easily. This is because the PR 410 may be doubled and duplicated (thereby doubling free or unoccupied packet spaces) without changing the packet arrangement within the PR 410. For example, if the current length for a packets round 410 is 2 BUs with 3 unoccupied packet spaces, then the number of unoccupied packet spaces can be doubled (to 6) by cloning the current PR 410 without changing the packet arrangement.
At block 240, grouping PIBs into K bins includes grouping PIBs by values into K bins such that:
The kth bin has Pk number of PIBs (number of devices 110 with same PIB) with identical values, also equal to the bin's index k, such that:
Pk=count(PIBm≡k) [EQ. 6]
The symbol indicates “is the same as.” m is the set of devices 110 (mε1 . . . M) and k is the bins (kε1 . . . K) and
As a PR 410 grows (e.g., by doubling) the PR 410 may be considered as including 2N BUs, where N is a measure of the size of PRs 410. With all the above-noted values in place, the PR 410 may be constructed as discussed with reference to
y=y*2+Pn+1 [EQ. 8]
Thus, for example, when n=0 and y=0 in the first iteration, the number of used spaces y is P1 or the number of devices 110 in bin 1. At block 340, a check is performed as follows:
The comparison in EQ. 9 is between the number of unoccupied spaces (total spaces minus the used spaces y on the left) and a summation of the number of devices 110 in the remaining bins (on the right). When the number of unoccupied spaces is less than the number of devices 110 in the remaining bins, then the process ends because there is insufficient bandwidth. When the number of unoccupied spaces is greater than or equal to the number of devices 110 in the remaining bins, then the process proceeds to block 350. At block 350, incrementing n by 1 and joining the PR 410 from the current loop with the existing PR 410 (which is null for the first iteration) is followed by returning the process to block 320. In the case of insufficient bandwidth, the initial PR 410 may be doubled, as discussed above, to double the number of unoccupied spaces and repeat the processes shown in
To address bandwidth requirements, the following inequality may be used to check whether a PR 410 may be deterministically arranged for a given set of Pk if Pk>0 for all Pk (every bin has at least one device 110):
A more generalized form of establishing the bandwidth boundary may be written as:
Tk=f(Tk−1) and Tk=N−(k−1) if Pk>0 for all k=1 . . . K. As a result, if block 320 is removed from the iterative process shown in
While the invention has been described with reference to an exemplary embodiment or embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the scope of the claims.
Number | Name | Date | Kind |
---|---|---|---|
5748624 | Kondo | May 1998 | A |
6657983 | Surazski et al. | Dec 2003 | B1 |
7187665 | Nakamura | Mar 2007 | B2 |
7233584 | Nguyen et al. | Jun 2007 | B2 |
7499421 | Lee et al. | Mar 2009 | B2 |
7596113 | Kingston et al. | Sep 2009 | B1 |
7768992 | Pun | Aug 2010 | B2 |
8346273 | Weigand | Jan 2013 | B2 |
8351369 | Han et al. | Jan 2013 | B2 |
20030031193 | Andrews et al. | Feb 2003 | A1 |
20040235488 | Choi | Nov 2004 | A1 |
20050036466 | Malik | Feb 2005 | A1 |
20070019594 | Perumal et al. | Jan 2007 | A1 |
20090116438 | Madan | May 2009 | A1 |
Number | Date | Country |
---|---|---|
2005040959 | May 2005 | WO |
Entry |
---|
Extended European Search Report for EP Application No. 15166412.5-1857, dated Sep. 18, 2015, pp. 1-7. |
Number | Date | Country | |
---|---|---|---|
20150326333 A1 | Nov 2015 | US |