This paper reviews the research work done on the Modeling and Analysis of Wireless Controller Area Network (WCAN). The controller area network (CAN) has been long regarded as the pioneer in standardizing vehicle bus standard. Its influence has even been reached out to various applications in industrial automation; which includes military, aviation, electronics and many others. With wireless technology becoming more pervasive, there is also a need for CAN too to migrate and evolve to its wireless counterpart [1]. A few methods were proposed in the last decade [2-6] that utilized the advantageous of CAN into a wireless network system called wireless controller area network (WCAN). This paper reviews these approaches of WCAN.
The wireless controller area network (WCAN) is a new approach of using CAN message-based protocol in wireless network. Various ideas have been proposed by researchers to allow ease of transition from CAN into WCAN [2-6]. Most of this research is centered on the role of the MAC layer in providing protocol to WCAN.
Dridi et al. in [2-4], propose the application of a contention-based WCAN protocol using the RTS/CTS mechanism that is used in IEEE 802.11 protocol. The RTS/ CTS mechanism is used to reduce frame collisions introduced by the hidden node problem. Dridi et al. uses RTS/ CTS mechanism in managing priority between nodes. Changes are done to the standard RTS/CTS frame that allows for message identifier. The MAC-addresses in RTS and CTS frame are replaced by the 29-bit CAN message identifier to allow a message-based protocol. Additionally, the RTS/CTS mechanism is used to enable a station or node to reserve the medium for a specified amount of time by specifying in the duration field the amount of time that the station/node requires for a subsequent transmission. This reservation information is stored at all stations in a variable called Network Allocation Variable (NAV) and represents the Virtual Carrier Sense. Inter-Frame Space (IFS) values are used to control the priority access of the station to the wireless medium and it represents the time interval between each transmission of frames, with Short IFS (SIFS) as the smallest type of IFS [
The authors in [5,6], propose Remote Frame MAC (RFMAC) and Wireless MAC (WMAC) protocols to be operated in both centralized and distributed WCAN networks. The RFMAC protocol operates in a centralized WCAN that consists of a master node and a number of slave nodes that are in the range of the master node. The RFMAC method uses the Idle Signal Multiple Access (ISMA) as its reference method. This access method enables upstream messages (to the central node) and downstream messages (to terminals) to be transmitted on a same shared channel. Instead of using the message identifier, the central or master node periodically broadcasts out remote frames to all terminals in the network. If the master node wishes to have data from any node, it broadcasts a remote frame over the channel. Each node on the network receives the remote frame and decides whether the remote frame belongs to the node by using acceptance filtering. If the remote frame identifier does not match with the acceptance filter, the terminal node stays idle. Else, a data frame is sent out by the terminal node with the same frame identifier.
On the other hand, the WMAC (Wireless MAC) WCAN allows several nodes to communicate with each other without the assistance of a central node. The contention situation is solved by utilizing different Priority IFS (PIFS) for each message. Each node must wait for a PIFS time value before it is allowed to send its message. PIFS times provide message priority and are derived from the scheduling method which is performed by the user application. The message with the shortest PIFS takes the highest priority, as it requires the shortest delay to access the channel.
Inspired by the token frame scheme introduced in [7- 12], the authors in [
WCAN is the new adaptation of its wired cousin CAN. The WCAN presented in [
Depending on the requirements and the CAN frame format, some modifications are needed to be done on token frame.
In
E. At time 0, D transmits the token with sequence number 0, at time 1, E transmits the token with the sequence number 1 and so on. D will not hear the transmission from F and A but when it hears the transmission from B, D will notice that the sequence number has been increased by 3 instead of 1, This indicates that there were two stations that it could not hear between E and B. With this information, station D could build an ordered list of nodes that are available in the ring as shown in the connectivity of D.
As aforementioned, the WCAN system in [
The token is then transmitted out to the next station in the ring based on the ordered list that the station has. The next station captures the token and examines the message identifier first. If the message identifier has the higher priority, the station will transmit the same token to the next station on the ordered list. However, if the station wants to transmit a message or information which itself has higher priority, it will replace the message identifier in the token with its own and transmits it to the next station. A station or node will know if its transmission is successful only when the token it receives next contains the same message identifier it has. Otherwise, it will be in receiving mode until it receives the token back with a lower priority message identifier.
In order for the ring to be flexible in its network topology, partial connectivity has been introduced. Nodes are allowed to join the ring in a dynamic manner. Nodes can join if the rotation time (sum of token holding times per node) would not grow unacceptably with the addition of the new node.
A different approach is done to enable a node to leave the network.
to node D, node B will find the following connected node and send the SET_PREDECESSOR token.
The WCAN operation can be divided into two main operations; namely the normal operation and the soliciting operation. The normal operation involves only data packet transmission within WCAN network with a set number of nodes. The soliciting operation however engages a lot of decision making, as it involves soliciting operation with nodes that are outside of the network [13,14].
In normal operation, a node makes only certain changes on its operating module. In this operation, there is no joining process, which means either the ring is full or there is no station outside of the ring. When a node gets the token in its idle state, it goes to have token and monitoring state. The station goes back to the idle state from the monitoring state when it receives the implicit ack.
The soliciting operation involves many procedures in order for a node to join or leave the network. In order for the ring to be flexible in its network topology, partial connectivity has been introduced. Nodes are allowed to join the ring in a dynamic manner. Nodes can join if the rotation time (sum of token holding times per node) would not grow unacceptably with the addition of the new node. A different approach is done to enable a node to leave the network. For a node to leave the network, it must first inform its successor and predecessor that it is leaving the network.
In order for a node to gain access to the medium, the node must first capture the token that circulates around the network. The token is generated first by a ring master assigned in the network. Once a token is captured, a node wins the arbitration by comparing the message identifier located in FC. Once a node wins the arbitration, it will place its message identifier into the FC field and starts transmitting its data to the next node on its list, which is the predecessor. Otherwise, the said node will be in the receiving end and relays the token until it receives a token with lower message identifier priority.
The following steps describe the process of WCAN operation. For simplicity, it is assumed that each node knows its successor and predecessor nodes during this operation [13,14].
• From the initializing process, the ring owner of the network begins its operation by creating the first token to be circulated into the network. If the owner has data to transmit, it adds a data frame into the token and changes the frame type to data token frame. Other nodes in the network are shifted into idle mode till they receive the circulated token.
• When another participating node receives the circulated token during the idle state, it checks for the frame type of the token first before comparing the MsgID of the token. If the receiving node receives the data token, it first checks if the MsgID is dedicated to the node. If yes, it will process the received data by sending it to the node’s upper OSI layer. Otherwise, the node checks for any data to be transmitted and begins the arbitration process. For successful arbitration, the node will replace the frame MsgID and remove the data from the token.
Otherwise, the node stores its data in its buffer before getting a chance to transmit it. The process is relatively the same when the node receives an empty token, with the exception of arbitration process.
• Once the node finishes the process, the node will begin transmitting an acknowledgement frame to its predecessor or previous hop node. During this time, the node goes into monitoring state and awaits the acknowledgement reply.
• A source node will know if its transmission is successful only by receiving the data token that consists of the same MsgID in it. The source node in return frees the token and releases it to the ring network.
As stated earlier, the transmission of messages in WCAN proceeds in one direction along the ring network.
By assuming the propagation delay (PROP) as DCF (Distributed Co-ordination Function) interframe space (DIFS), which is the period of time when channel is available, the token rotation time (TRT) can be calculated as [
In WCAN, the active nodes may send one packet and one token in a token rotation cycle, while the inactive nodes just forward the token. Thus, the aggregate throughput, for a token ring network with n active nodes may be derived as [
It is proven in [
Wireless industrial networks are data-centric, these networks are deployed in critical applications, where the timeliness is perhaps the most difficult requirement to meet, due to the tradeoffs between power consumption, interference mitigation, scheduling and routing efficiency.
Several research challenges in the networking, operating systems and middleware layers must be coordinated to identify adequate solutions. Existing MAC protocols for multihop wireless networks can be classified into four categories: 1) scheduling based; 2) collision free; 3) contention based; and 4) hybrid schemes.
These existing MAC protocols focus more on optimizing system throughput. The key challenge remains to provide predictable delay and/or prioritization guarantees while minimizing overhead packets and energy consumption.
In [
WCAN with priority is an extension of the WCAN protocol by the integration of algorithms to manage concurrency [
• In the RTS, CTS and ACK frames, the MAC-addresses are replaced by the 29-bit CAN_ID, within the arbitration field.
• The 2-bits ACK field within the CAN frame is replaced by a dedicated ACK frame.
• The IFS (Inter-Frame Space) access priority and binary exponential back-off algorithm to gain access to the medium is still used.
The main modification of the RTS/CTS scheme in the WCAN case is that the MAC address is substituted by the Arbitration field. This characteristic means that the WCAN protocol is Data-Centric so it is based on total diffusion or directed diffusion. However, the RTS/CTS mechanism cannot be used for MPDUs with broadcast and multicast immediate address because there are multiple destinations for the RTS, and thus potentially multiple concurrent senders of the CTS will respond. On the other hand, the RTS/CTS mechanism need not be used for every data frame transmission, because the additional RTS and CTS frames add overhead inefficiency. The mechanism is not always justified, especially for short data frames.
In [
• Manage priority between data frames;
• Minimise numbers of CTS in response of an RTS;
• Optimise Energy consumption.
RTS/CTS mechanism is used in 802.11 standards to enable a station to reserve the medium for a specified time through the use of RTS and CTS frames. In this case of WCAN this mechanism is used for medium reservation and essentially for priority arbitration by Object-ID.
The producer (henceforth mentioned as sender) is an application that captures information and diffuses it for consumers (mentioned hereafter as receiver).
The sender senses the medium when it is in the idle state. It waits for a period of short Inter Frame Space (SIFS) and sends its RTS frame. After sending its RTS frame, the sender waits, for an extended SIFS (ESIFS), for an eventual CTS frame that indicates that there is another sender having a more priority data level.
The priority arbitration in this scheme is calculated by the bit by bit comparison of the Object-ID. For priority arbitration the same mechanism used by the CAN protocol is used, where “0” represent a dominant bit and “1” represent the recessive. The position of the first recessive bit indicate the range of Object-ID where the data to be transmitted have more priority. In order to economise time for high level priority data we calculate the Priority period as [
n = posfirst 1;
: value of the bit in the position i of the immediate more priority Object-ID;
a Slot Time.
In this step, the node must calculate the Object-ID of the immediate more priority data level. To deduct this value the sender makes a binary subtraction of his Object-ID by 1. The resulting Object-ID is used to determinate the n parameter used in the above formula. In this formula n is the position of first bit that the value is equal to “1”. If after ESIFS “Extended SIFS” no CTS frame was received the node concludes that his data have the most priority and send his data frame [
A Slot Time: The value of the correspondingly named PHY characteristic.
In the case of receiving a CTS frame that indicates the presence of a data to transmit with more priority level, the node updates his network allocation vector (NAV) with the value of Duration/ID field in the CTS frame. To save energy, the node sleeps for the duration of NAV if it is not a consumer of the data designated by the Object-ID of the received CTS frame.
Consumers (receivers) are nodes that need the data referenced by the Object-ID. Every node that receives an RTS frame must compare its Object-ID with that in the RTS frame if it has data to transmit. If it has no data to send, it updates its NAV with the duration mentioned in the Duration/ID field of the received RTS frame. If it is not a consumer, it sleeps for the period of the NAV. In the case of having a more priority level the node senses a medium. If the medium is in the Idle state for Priority SIFS (PSIFS) it sends a CTS frame. The PSIFS duration permit as to encourage the send of the CTS frame of the data that have the most priority. In the case of receiving a CTS frame during the PSIFS what indicate that there is a more data priority level, the node must update its NAV and if it is not a data consumer it must sleep during the NAV period. If no CTS received during PSIFS the node conclude that it has the most priority to send and send its data after an SIFS [
With:
n = posfirst 1;
a Slot Time;
: value of the bit in the position i.
The WCAN protocol uses a dedicated frame for acknowledgement to indicate the state of received data frame. In this scheme RTS/CTS to manage priority, low level priority data frame take too much time to be transmitted when the network is not in use. To optimise our network use acknowledgment frames are sent in this time using the standard CSMA/CA. If there are a RTS or CTS frame received that has an ESIFS greater than DIFS and the sender node has not received an ACK frame for DIFS + SIFS time, he concludes that the data was not received and proceed for retransmission.
Let be the normalized system throughput, defined as the fraction of time the channel is used to successfully transmit payload bits. To compute, let us analyse what can happen in a randomly chosen slot time. Let be the probability that there is at least one transmission in the considered slot time. And let be the probability that a transmission is successful, given the probability. So one has [
Now, one is able to express the normalized system throughput S as the ratio [
and are the average time the channel is sensed busy because of a successful transmission or collision respectively. The is the average packet length and is the duration of empty slot time.
In the case of the protocol “WCAN [15,16] with priority” only RTS/CTS access mechanism is used, so collision can be only between two RTS frames. Every node that has data to send must wait for an ESIFS time to send his data if there are no node that has more priority data level. Based on these constraints we obtain:
In [
In this review paper, a few different models of Wireless controller area network schemes are presented, namely the WCAN with token ring scheme, WCAN using RTS/ CTS scheme and the WCAN model using the RFMAC and WMAC. The discussion of the WCAN using token scheme and WCAN using RTS/CTS scheme is presented in detail.
In the WCAN with contention based MAC protocol, the Request To Send/Clear To send (RTS/CTS) mechanism is applied with priority considerations to manage concurrency. In [
The WCAN with the token scheme shares the same properties as can be found in WTRP protocol with a few modification and adjustment on the token frame. Furthermore, the flexibility of the topologies allows nodes to join and leave the network dynamically. The developed WCAN is built on the MAC layer as a wireless based distributed MAC protocol for ad-hoc network. WCAN was deployed using QualNet simulator and achieve mixed reaction results. Simulation results show that WCAN outperform IEEE 802.11 in terms of throughput in a ring network environment. However, in terms of average endto-end delay, WCAN increases linearly with increasing number of nodes and is slightly higher than IEEE 802.11. This is due to the fact that every node takes turn in transmitting the token around the ring network causing the overall delay to increase. From the results, it’s shown that WCAN provide “fair” share for all nodes by scheduling the transmission with token reception. Additionally, WCAN is advantageous by reducing collision probability, by distributing the resource fairly among each node.