03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4-June-07 P1901_PRO_016_r0<br />

The rule shall be “the lowest MID, the best”, analyzing the MID as a number.<br />

Then, one of the nodes of the worse BPL cell will register in the neighbor network using the <strong>Access</strong> Protocol, <strong>and</strong> it<br />

will act as master of its BPL cell, distributing the token.<br />

If one node does not perform this protocol it does not copy the MID inherited from its master, instead it fixes the<br />

local MID to one of these values:<br />

0x1FFFFF. Nodes that have not completed the <strong>Access</strong> Protocol.<br />

0x130001. Nodes that have finished the <strong>Access</strong> Protocol.<br />

Border node designation<br />

The border node is the modem that will act as a bridge between the networks passing the token.<br />

Once the interference is detected, the network with higher MID must decide which node within the BPL cell, will<br />

perform registration.<br />

Designation Rules<br />

The master will select the Border Node with the following criteria:<br />

Less hops, higher priority. This is, if the interference is detected by several nodes, the HE has preference over the<br />

rest of the nodes; next TDRs placed one hop away; next repeaters with two hops, etc.<br />

CPEs do not perform this protocol, only HEs <strong>and</strong> TDRs do. A node that detects only a CPE of a neighbor BPL cell<br />

does not apply for becoming border node.<br />

Notification protocol<br />

To centralize the decision, the HE of the BPL cell decides which node will perform negotiation, interchanging CCP<br />

packets. Since the interference will not be detected by all the nodes simultaneously, a guard time may be kept before<br />

designating the border node in order to know all the information.<br />

If any node detects the interference (sniffing a better MID), it transmits an Interference Detection Packet (IDP),<br />

containing the own <strong>MAC</strong>, the neighbor <strong>MAC</strong> sniffed, the MID sniffed, the local number of hops <strong>and</strong> the identity of<br />

the node detected (HE or TDR). When the packet is received by a node, it has to check if is coming from one of its<br />

slaves, then the information is copied <strong>and</strong> retransmitted to its master, then the packet will arrive finally to the HE of<br />

the BPL cell. To avoid flooding the network, the IDPs have to be sent with a minimum period of 10 seconds<br />

Submission page 271 UPA-OPERA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!