SlideShare a Scribd company logo
1 of 25
Multichannel Medium Access
Control (MMAC)
Eng.Ahmed Ali El-Kosairy
eng.aelkosairy@gmail.com
Multichannel Medium Access
Control (MMAC)
Need to know MAC :
●

IEEE- 802.11

●

It only utilizes one channel at present

●

The primary reason is that hosts with a single
half-duplex transceiver can only transmit or listen
to one channel at a time.
MAC -Con
●

has 2 modes
–

DCF (Distributed Coordination Function)

–

PCF (Point Coordination Function)
●

For centrally coordinated infrastructure-based networks
MAC-Con
●

DCF (Distributed Coordination Function)
–

for ad hoc networks

–

based on CSMA with Collision Avoidance
(CSMA/CA) protocol which:
●

combination of the CSMA and MACA schemes.
MMAC
●

●

MMAC is an adaptation to the DCF to use
multiple channels.

How does it work :
–

Similar to the Dynamic Power-Saving Mechanism
(DPSM) scheme
Dynamic Power-Saving Mechanism
(DPSM)
●

●

Time is divided into beacon intervals
All nodes wake up at the beginning of a beacon interval
for a fixed duration of time (ATIM window)
–

●

<Ad Hoc Traffic Indication Message (ATIM)>

Exchange ATIM (Ad-hoc Traffic Indication Message)
during ATIM window
DPSM-Con
●

●

Nodes that receive ATIM message stay up
during for the whole beacon interval
Nodes that do not receive ATIM message may
go into doze mode after ATIM window
How does it work (MMAC)
●

●

●

●

●

Divide time into beacon intervals
At the beginning of each beacon interval, all nodes must listen to a
predefined common channel for a fixed duration of time (ATIM
window)
Nodes negotiate channels using ATIM messages
Nodes switch to selected channels after ATIM window for the rest
of the beacon interval
Use PCL
Preferred Channel List (PCL)
●

Each node maintains PCL

●

Records usage of channels inside the transmission range

●

High preference (HIGH)
–

●

Medium preference (MID)
–

●

Already selected for the current beacon interval
No other vicinity node has selected this channel

Low preference (LOW)
–

This channel has been chosen by vicinity nodes

–

Count number of nodes that selected this channel to break ties
Channel Negotiation
Common Channel

Selected Channel

A

Beacon

B

C

D

Time
ATIM Window
Beacon Interval

Key Ideas
Channel Negotiation
●

In ATIM window, sender transmits ATIM to the receiver

●

Sender includes its PCL in the ATIM packet

●

●

Receiver selects a channel based on sender’s PCL and its
own PCL
Order of preference: HIGH > MID > LOW
Channel Negotiation-con
●

●

●

Tie breaker: Receiver’s PCL has higher priority
Receiver sends ATIM-ACK to sender including
the selected channel
Sender sends ATIM-RES to notify its neighbors
of the selected channel
Channel Negotiation
Common Channel

A

B

Selected Channel

ATIMATIM RES(1)
Beacon

ATIMACK(1)

C

D

Time
ATIM Window
Beacon Interval

Key Ideas
Channel Negotiation
Common Channel

A

B

C

D

Selected Channel

ATIMATIM RES(1)
Beacon

ATIMACK(1)
ATIMACK(2)

ATIM

ATIMRES(2)

Time

ATIM Window
Beacon Interval

Key Ideas
Channel Negotiation
Common Channel

A

B

C

D

ATIMATIM RES(1)

Selected Channel

RTS

DATA

Channel 1
Beacon

Channel 1
CTS

ATIMACK(1)
ATIMACK(2)

ACK

CTS

ACK

Channel 2

Channel 2
ATIM

ATIMRES(2)

RTS

DATA

Time

ATIM Window
Beacon Interval

Key Ideas
Advantages of MAC
●

●

The performance of MMAC is better than that of
IEEE 802.11 and Dynamic Channel Assignment
(DCA) in terms of throughput.
It can be easily integrated with IEEE 802.11
Power-Saving Mechanism (PSM) mode while
using a simple hardware.
Aggregate Throughput (Kbps)

Performance Test
2500

2500

MMAC

2000

DCA

1500
1000
500

MMAC

2000
1500

DCA

1000

802.11

1
10
100
1000
Packet arrival rate per flow (packets/sec)

30 nodes

500

1

802.11
10
100
1000
Packet arrival rate per flow (packets/sec)

64 nodes

MMAC shows higher throughput than DCA and 802.11
Disadvantages of MAC

●

It has a longer packet delay than DCA. More
over, it is not suitable for multi hop ad hoc
networks as it assumes that the nodes are
synchronized.
Looking for

●

A better scheme for clock synchronization
Dynamic Channel Assignment with
Power Control (DCA-PC)
DCA-PC
●

●

DCA-PC is an extension of their DCA protocol
that did not consider the issue of power control.
It combines concepts of power control and
multiple-channel medium access in the context
of MANETs.
How Does It work
●

●

The hosts are assigned channels dynamically
Every node is equipped with two half-duplex
transceivers, and the bandwidth is divided into
–

Control channel ,which:
●

–

operate to exchange control pkt

Multiple data channels
●

Exchanging data and acknowledgments (with power control).
How Does It work-2
●

●

When a host needs a channel to talk to another,
it engages in an RTS–CTS–RES exchange

where RES is a special reservation packet
–

indicating the appropriate data channel to be used.
How Does It work-3
●

very node keeps a table of power levels to be:
–

●

These power levels are calculated based on:
–

●

used when communicating with any other node.
the RTS–CTS exchanges on the control channel

Because:
–

every node is always listening to the control channel.

–

it can even dynamically update the power values based on the
other control exchanges happening around it
Advantages of DCA-PC
●

●

DCA-PC has been shown to achieve higher
throughput than DCA.
DCA-PC is a novel attempt at solving dynamic
channel assignment and power control issues
in an integrated fashion.

More Related Content

What's hot

Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Gsm physical and-logical_channels
Gsm physical and-logical_channelsGsm physical and-logical_channels
Gsm physical and-logical_channelsTushar Saxena
 
Sdcch Blocking Analysis
Sdcch Blocking AnalysisSdcch Blocking Analysis
Sdcch Blocking AnalysisAssim Mubder
 
Telecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber OpticsTelecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber Opticssuryateja swamy
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13daniel ayalew
 
2013 hspa optimization doc huawei
2013 hspa optimization doc huawei2013 hspa optimization doc huawei
2013 hspa optimization doc huaweiAlireza Mojarrad
 
3g umts-originating-call Call Flow
3g umts-originating-call Call Flow3g umts-originating-call Call Flow
3g umts-originating-call Call FlowEduard Lucena
 
3g counter & timer
3g counter & timer3g counter & timer
3g counter & timerTABREZ KHAN
 
Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05daniel ayalew
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11daniel ayalew
 
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...IAEME Publication
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umtslamno
 
Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11Farzad Ramin
 
Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10daniel ayalew
 
2G optimization_with_optima
2G optimization_with_optima2G optimization_with_optima
2G optimization_with_optimaZIZI Yahia
 

What's hot (20)

Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Gsm physical and-logical_channels
Gsm physical and-logical_channelsGsm physical and-logical_channels
Gsm physical and-logical_channels
 
Sdcch Blocking Analysis
Sdcch Blocking AnalysisSdcch Blocking Analysis
Sdcch Blocking Analysis
 
Telecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber OpticsTelecommunicatoins and Fiber Optics
Telecommunicatoins and Fiber Optics
 
Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13Traffic and Congestion Control in ATM Networks Chapter 13
Traffic and Congestion Control in ATM Networks Chapter 13
 
2013 hspa optimization doc huawei
2013 hspa optimization doc huawei2013 hspa optimization doc huawei
2013 hspa optimization doc huawei
 
3g umts-originating-call Call Flow
3g umts-originating-call Call Flow3g umts-originating-call Call Flow
3g umts-originating-call Call Flow
 
3g counter & timer
3g counter & timer3g counter & timer
3g counter & timer
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05Asynchronous Transfer mode Chapter 05
Asynchronous Transfer mode Chapter 05
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Ch24
Ch24Ch24
Ch24
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...
 
Call flow comparison gsm umts
Call flow comparison gsm umtsCall flow comparison gsm umts
Call flow comparison gsm umts
 
Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11
 
Gsm system architecture
Gsm system architectureGsm system architecture
Gsm system architecture
 
Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10Congestion Control in Data Networks And Internets Chapter 10
Congestion Control in Data Networks And Internets Chapter 10
 
2G optimization_with_optima
2G optimization_with_optima2G optimization_with_optima
2G optimization_with_optima
 

Similar to Multichannel medium access control (mmac)

Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxssuserc02c1f
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.pptsyam babu
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksIffat Anjum
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxmsohail37
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismsupriyaharlapur1
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptxVivekRastogi27
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocolsNitesh Singh
 
4G-Fourth Generation Mobile Communication System
4G-Fourth Generation Mobile Communication System4G-Fourth Generation Mobile Communication System
4G-Fourth Generation Mobile Communication SystemSafaet Hossain
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 

Similar to Multichannel medium access control (mmac) (20)

Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio NetworksDecentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
Decentralized Predictive MAC Protocol for Ad Hoc Cognitive Radio Networks
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
HSPA Essentials
HSPA EssentialsHSPA Essentials
HSPA Essentials
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
final
finalfinal
final
 
1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx1-4_Kwak-WBAN MAC Issues1.pptx
1-4_Kwak-WBAN MAC Issues1.pptx
 
New framing-protocols
New framing-protocolsNew framing-protocols
New framing-protocols
 
05 a rrm ul dl scheduler
05 a rrm ul dl scheduler05 a rrm ul dl scheduler
05 a rrm ul dl scheduler
 
4G-Fourth Generation Mobile Communication System
4G-Fourth Generation Mobile Communication System4G-Fourth Generation Mobile Communication System
4G-Fourth Generation Mobile Communication System
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Multichannel medium access control (mmac)

  • 1. Multichannel Medium Access Control (MMAC) Eng.Ahmed Ali El-Kosairy eng.aelkosairy@gmail.com
  • 2. Multichannel Medium Access Control (MMAC) Need to know MAC : ● IEEE- 802.11 ● It only utilizes one channel at present ● The primary reason is that hosts with a single half-duplex transceiver can only transmit or listen to one channel at a time.
  • 3. MAC -Con ● has 2 modes – DCF (Distributed Coordination Function) – PCF (Point Coordination Function) ● For centrally coordinated infrastructure-based networks
  • 4. MAC-Con ● DCF (Distributed Coordination Function) – for ad hoc networks – based on CSMA with Collision Avoidance (CSMA/CA) protocol which: ● combination of the CSMA and MACA schemes.
  • 5. MMAC ● ● MMAC is an adaptation to the DCF to use multiple channels. How does it work : – Similar to the Dynamic Power-Saving Mechanism (DPSM) scheme
  • 6. Dynamic Power-Saving Mechanism (DPSM) ● ● Time is divided into beacon intervals All nodes wake up at the beginning of a beacon interval for a fixed duration of time (ATIM window) – ● <Ad Hoc Traffic Indication Message (ATIM)> Exchange ATIM (Ad-hoc Traffic Indication Message) during ATIM window
  • 7. DPSM-Con ● ● Nodes that receive ATIM message stay up during for the whole beacon interval Nodes that do not receive ATIM message may go into doze mode after ATIM window
  • 8. How does it work (MMAC) ● ● ● ● ● Divide time into beacon intervals At the beginning of each beacon interval, all nodes must listen to a predefined common channel for a fixed duration of time (ATIM window) Nodes negotiate channels using ATIM messages Nodes switch to selected channels after ATIM window for the rest of the beacon interval Use PCL
  • 9. Preferred Channel List (PCL) ● Each node maintains PCL ● Records usage of channels inside the transmission range ● High preference (HIGH) – ● Medium preference (MID) – ● Already selected for the current beacon interval No other vicinity node has selected this channel Low preference (LOW) – This channel has been chosen by vicinity nodes – Count number of nodes that selected this channel to break ties
  • 10. Channel Negotiation Common Channel Selected Channel A Beacon B C D Time ATIM Window Beacon Interval Key Ideas
  • 11. Channel Negotiation ● In ATIM window, sender transmits ATIM to the receiver ● Sender includes its PCL in the ATIM packet ● ● Receiver selects a channel based on sender’s PCL and its own PCL Order of preference: HIGH > MID > LOW
  • 12. Channel Negotiation-con ● ● ● Tie breaker: Receiver’s PCL has higher priority Receiver sends ATIM-ACK to sender including the selected channel Sender sends ATIM-RES to notify its neighbors of the selected channel
  • 13. Channel Negotiation Common Channel A B Selected Channel ATIMATIM RES(1) Beacon ATIMACK(1) C D Time ATIM Window Beacon Interval Key Ideas
  • 14. Channel Negotiation Common Channel A B C D Selected Channel ATIMATIM RES(1) Beacon ATIMACK(1) ATIMACK(2) ATIM ATIMRES(2) Time ATIM Window Beacon Interval Key Ideas
  • 15. Channel Negotiation Common Channel A B C D ATIMATIM RES(1) Selected Channel RTS DATA Channel 1 Beacon Channel 1 CTS ATIMACK(1) ATIMACK(2) ACK CTS ACK Channel 2 Channel 2 ATIM ATIMRES(2) RTS DATA Time ATIM Window Beacon Interval Key Ideas
  • 16. Advantages of MAC ● ● The performance of MMAC is better than that of IEEE 802.11 and Dynamic Channel Assignment (DCA) in terms of throughput. It can be easily integrated with IEEE 802.11 Power-Saving Mechanism (PSM) mode while using a simple hardware.
  • 17. Aggregate Throughput (Kbps) Performance Test 2500 2500 MMAC 2000 DCA 1500 1000 500 MMAC 2000 1500 DCA 1000 802.11 1 10 100 1000 Packet arrival rate per flow (packets/sec) 30 nodes 500 1 802.11 10 100 1000 Packet arrival rate per flow (packets/sec) 64 nodes MMAC shows higher throughput than DCA and 802.11
  • 18. Disadvantages of MAC ● It has a longer packet delay than DCA. More over, it is not suitable for multi hop ad hoc networks as it assumes that the nodes are synchronized.
  • 19. Looking for ● A better scheme for clock synchronization
  • 20. Dynamic Channel Assignment with Power Control (DCA-PC)
  • 21. DCA-PC ● ● DCA-PC is an extension of their DCA protocol that did not consider the issue of power control. It combines concepts of power control and multiple-channel medium access in the context of MANETs.
  • 22. How Does It work ● ● The hosts are assigned channels dynamically Every node is equipped with two half-duplex transceivers, and the bandwidth is divided into – Control channel ,which: ● – operate to exchange control pkt Multiple data channels ● Exchanging data and acknowledgments (with power control).
  • 23. How Does It work-2 ● ● When a host needs a channel to talk to another, it engages in an RTS–CTS–RES exchange where RES is a special reservation packet – indicating the appropriate data channel to be used.
  • 24. How Does It work-3 ● very node keeps a table of power levels to be: – ● These power levels are calculated based on: – ● used when communicating with any other node. the RTS–CTS exchanges on the control channel Because: – every node is always listening to the control channel. – it can even dynamically update the power values based on the other control exchanges happening around it
  • 25. Advantages of DCA-PC ● ● DCA-PC has been shown to achieve higher throughput than DCA. DCA-PC is a novel attempt at solving dynamic channel assignment and power control issues in an integrated fashion.