SlideShare a Scribd company logo
1 of 18
Wireless and Mobile Computing
Delivered
By
Khadija Manzoor
Department of CS& IT
University of Gujrat
Lecture Agenda
 The aim of this lecture is to provide the reader
with a comprehensive view of the role and details
of the protocols that define and control access to
the wireless channel, i.e., wireless media access
protocols (MAC) protocols.
 Mac layer for Wireless and its issues
 MAC Classifications
 Design Goals
Introduction
 In the broadest terms, a wireless network consists of nodes
that communicate by exchanging “packets” via radio
waves.
 These packets can take two forms. A unicast packet
contains information that is addressed to a specific node,
whereas a multicast packet distributes the information to a
group of nodes.
 The MAC protocol simply determines when a node is
allowed to transmit its packets, and typically controls all
access to the physical layer.
Introduction
 The specific functions associated with a MAC protocol vary
according to the system requirements and application.
 For example, wireless broadband networks carry data
streams with strict quality of service (QoS) requirements.
This requires a complex MAC protocol that can
adaptively manage the bandwidth resources in order to
meet these demands.
 Design and complexity are also affected by the network
architecture, communication model, and duplexing
mechanism employed.
Issues
 The main issues need to be addressed while designing a
MAC protocol for ad hoc wireless networks:
• Bandwidth efficiency is defined at the ratio of the bandwidth
used for actual data transmission to the total available
bandwidth. The MAC protocol for ad-hoc networks should
maximize it.
• Quality of service support is essential for time-critical
applications. The MAC protocol for ad-hoc networks should
consider the constraint of ad-hoc networks.
• Synchronization can be achieved by exchange of control
packets.
Issues
 The main issues need to be addressed while designing a MAC
protocol for ad hoc wireless networks:
 Hidden and exposed terminal problems:
 Hidden nodes:
 Hidden stations: Carrier sensing may fail to detect
another station.
 Fading: The strength of radio signals diminished rapidly
with the distance from the transmitter.
 Exposed nodes:
 Exposed stations: B is sending to A. C can detect it. C
might want to send to E but conclude it cannot transmit
because C hears B.
 Collision masking: The local signal might drown out
the remote transmission.
 Error-Prone Shared Broadcast Channel
 Distributed Nature/Lack of Central Coordination
 Mobility of Nodes: Nodes are mobile most of the time.
Near and far terminals
 Consider the situation A and B are both sending with the same
transmission power. As the signal strength decreases
proportionally to the square of the distance, B’s signal drowns out
A’s signal.
 As a result, C cannot receive A’s transmission.
 Now think of C as being an intermediary for sending rights (e.g.,
C acts as a base station coordinating media access). In this case,
terminal B would already drown out terminal A on the physical
layer. C in return would have no chance of applying a fair scheme
as it would only hear B.
Near and far terminals
 The near/far effect is a severe problem of wireless networks. All
signals should arrive at the receiver with more or less the same
strength.
 Otherwise a person standing closer to somebody could always
speak louder than a person further away. Even if the senders were
separated by code, the closest one would simply drown out the
others.
 Precise power control is needed to receive all senders with the
same strength at a receiver.
issues
 The combination of network architecture, communication
model, and duplexing mechanism define the general
framework within which a MAC protocol is realized.
 Decisions made here will define how the entire system
operates and the level of interaction between individual
nodes. They will also limit what services can be offered and
define MAC protocol design.
 However, the unique characteristics of wireless
communication must also be taken into consideration.
issues
 Here, we explore these physical constraints and discuss
their impact on protocol design and performance.
 Radio waves propagate through an unguided medium
that has no absolute or observable boundaries and is
vulnerable to external interference. Thus, wireless links
typically experience high bit error rates and exhibit
asymmetric channel qualities.
 Techniques such as channel coding, bit interleaving,
frequency/space diversity, and equalization increase the
survivability of information transmitted across a
wireless link.
 However, the presence of asymmetry means that
The 802.11 MAC Sublayer
Protocol
Design goals of a MAC Protocol
 Design goals of a MAC protocol for ad hoc wireless networks
• The operation of the protocol should be distributed.
• The protocol should provide QoS support for real-time traffic.
• The access delay, which refers to the average delay experienced by
any packet to get transmitted, must be kept low.
• The available bandwidth must be utilized efficiently.
• The protocol should ensure fair allocation of bandwidth to nodes.
Design goals of a MAC Protocol
• Control overhead must be kept as low as possible.
• The protocol should minimize the effects of hidden and exposed
terminal problems.
• The protocol must be scalable to large networks.
• It should have power control mechanisms.
• The protocol should have mechanisms for adaptive data rate control.
• It should try to use directional antennas.
• The protocol should provide synchronization among nodes.
Classifications of MAC protocols
 Ad hoc network MAC protocols can be classified into
four types:
• Contention-based protocols
• Contention-based protocols with reservation mechanisms
• Contention-based protocols with scheduling mechanisms
• Other MAC protocols
15
MAC Protocols for Ad Hoc
Wireless Networks
Contention-Based
Protocols
Contention-based
protocols with
reservation mechanisms
Other MAC
Protocols
Contention-based
protocols with
scheduling mechanisms
Sender-Initiated
Protocols
Receiver-Initiated
Protocols
Synchronous
Protocols
Asynchronous
Protocols
Single-Channel
Protocols
Multichannel
Protocols
MACAW
FAMA
BTMA
DBTMA
ICSMA
RI-BTMA
MACA-BI
MARCH
D-PRMA
CATA
HRMA
RI-BTMA
MACA-BI
MARCH
SRMA/PA
FPRP
MACA/PR
RTMAC
Directional
Antennas
MMAC
MCSMA
PCM
RBAR
Classifications of MAC Protocols
 Contention-based protocols
• Sender-initiated protocols: Packet transmissions are initiated by
the sender node.
• Single-channel sender-initiated protocols: A node that wins
the contention to the channel can make use of the entire
bandwidth.
• Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
• Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
Classifications of MAC Protocols
 Contention-based protocols with reservation
mechanisms
• Synchronous protocols: All nodes need to be synchronized. Global
time synchronization is difficult to achieve.
• Asynchronous protocols: These protocols use relative time information
for effecting reservations.
Classifications of MAC Protocols
 Contention-based protocols with scheduling
mechanisms
• Node scheduling is done in a manner so that all nodes are
treated fairly and no node is starved of bandwidth.
• Scheduling-based schemes are also used for enforcing priorities
among flows whose packets are queued at nodes.
• Some scheduling schemes also consider battery characteristics.
 Other protocols are those MAC protocols that do not
strictly fall under the above categories.

More Related Content

Similar to W13-L1&2.pptx

1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkDushhyant Kumar
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanambitlick
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksIDES Editor
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 

Similar to W13-L1&2.pptx (20)

1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
mn paper
mn papermn paper
mn paper
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Tmac
TmacTmac
Tmac
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless Network
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 

More from HirazNor

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfHirazNor
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptxHirazNor
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxHirazNor
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxHirazNor
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxHirazNor
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptxHirazNor
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.pptHirazNor
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptxHirazNor
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptxHirazNor
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptxHirazNor
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptxHirazNor
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxHirazNor
 

More from HirazNor (14)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptx
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 

W13-L1&2.pptx

  • 1. Wireless and Mobile Computing Delivered By Khadija Manzoor Department of CS& IT University of Gujrat
  • 2. Lecture Agenda  The aim of this lecture is to provide the reader with a comprehensive view of the role and details of the protocols that define and control access to the wireless channel, i.e., wireless media access protocols (MAC) protocols.  Mac layer for Wireless and its issues  MAC Classifications  Design Goals
  • 3. Introduction  In the broadest terms, a wireless network consists of nodes that communicate by exchanging “packets” via radio waves.  These packets can take two forms. A unicast packet contains information that is addressed to a specific node, whereas a multicast packet distributes the information to a group of nodes.  The MAC protocol simply determines when a node is allowed to transmit its packets, and typically controls all access to the physical layer.
  • 4. Introduction  The specific functions associated with a MAC protocol vary according to the system requirements and application.  For example, wireless broadband networks carry data streams with strict quality of service (QoS) requirements. This requires a complex MAC protocol that can adaptively manage the bandwidth resources in order to meet these demands.  Design and complexity are also affected by the network architecture, communication model, and duplexing mechanism employed.
  • 5.
  • 6. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks: • Bandwidth efficiency is defined at the ratio of the bandwidth used for actual data transmission to the total available bandwidth. The MAC protocol for ad-hoc networks should maximize it. • Quality of service support is essential for time-critical applications. The MAC protocol for ad-hoc networks should consider the constraint of ad-hoc networks. • Synchronization can be achieved by exchange of control packets.
  • 7. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks:  Hidden and exposed terminal problems:  Hidden nodes:  Hidden stations: Carrier sensing may fail to detect another station.  Fading: The strength of radio signals diminished rapidly with the distance from the transmitter.  Exposed nodes:  Exposed stations: B is sending to A. C can detect it. C might want to send to E but conclude it cannot transmit because C hears B.  Collision masking: The local signal might drown out the remote transmission.  Error-Prone Shared Broadcast Channel  Distributed Nature/Lack of Central Coordination  Mobility of Nodes: Nodes are mobile most of the time.
  • 8. Near and far terminals  Consider the situation A and B are both sending with the same transmission power. As the signal strength decreases proportionally to the square of the distance, B’s signal drowns out A’s signal.  As a result, C cannot receive A’s transmission.  Now think of C as being an intermediary for sending rights (e.g., C acts as a base station coordinating media access). In this case, terminal B would already drown out terminal A on the physical layer. C in return would have no chance of applying a fair scheme as it would only hear B.
  • 9. Near and far terminals  The near/far effect is a severe problem of wireless networks. All signals should arrive at the receiver with more or less the same strength.  Otherwise a person standing closer to somebody could always speak louder than a person further away. Even if the senders were separated by code, the closest one would simply drown out the others.  Precise power control is needed to receive all senders with the same strength at a receiver.
  • 10. issues  The combination of network architecture, communication model, and duplexing mechanism define the general framework within which a MAC protocol is realized.  Decisions made here will define how the entire system operates and the level of interaction between individual nodes. They will also limit what services can be offered and define MAC protocol design.  However, the unique characteristics of wireless communication must also be taken into consideration.
  • 11. issues  Here, we explore these physical constraints and discuss their impact on protocol design and performance.  Radio waves propagate through an unguided medium that has no absolute or observable boundaries and is vulnerable to external interference. Thus, wireless links typically experience high bit error rates and exhibit asymmetric channel qualities.  Techniques such as channel coding, bit interleaving, frequency/space diversity, and equalization increase the survivability of information transmitted across a wireless link.  However, the presence of asymmetry means that
  • 12. The 802.11 MAC Sublayer Protocol
  • 13. Design goals of a MAC Protocol  Design goals of a MAC protocol for ad hoc wireless networks • The operation of the protocol should be distributed. • The protocol should provide QoS support for real-time traffic. • The access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low. • The available bandwidth must be utilized efficiently. • The protocol should ensure fair allocation of bandwidth to nodes.
  • 14. Design goals of a MAC Protocol • Control overhead must be kept as low as possible. • The protocol should minimize the effects of hidden and exposed terminal problems. • The protocol must be scalable to large networks. • It should have power control mechanisms. • The protocol should have mechanisms for adaptive data rate control. • It should try to use directional antennas. • The protocol should provide synchronization among nodes.
  • 15. Classifications of MAC protocols  Ad hoc network MAC protocols can be classified into four types: • Contention-based protocols • Contention-based protocols with reservation mechanisms • Contention-based protocols with scheduling mechanisms • Other MAC protocols 15 MAC Protocols for Ad Hoc Wireless Networks Contention-Based Protocols Contention-based protocols with reservation mechanisms Other MAC Protocols Contention-based protocols with scheduling mechanisms Sender-Initiated Protocols Receiver-Initiated Protocols Synchronous Protocols Asynchronous Protocols Single-Channel Protocols Multichannel Protocols MACAW FAMA BTMA DBTMA ICSMA RI-BTMA MACA-BI MARCH D-PRMA CATA HRMA RI-BTMA MACA-BI MARCH SRMA/PA FPRP MACA/PR RTMAC Directional Antennas MMAC MCSMA PCM RBAR
  • 16. Classifications of MAC Protocols  Contention-based protocols • Sender-initiated protocols: Packet transmissions are initiated by the sender node. • Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth. • Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels. • Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.
  • 17. Classifications of MAC Protocols  Contention-based protocols with reservation mechanisms • Synchronous protocols: All nodes need to be synchronized. Global time synchronization is difficult to achieve. • Asynchronous protocols: These protocols use relative time information for effecting reservations.
  • 18. Classifications of MAC Protocols  Contention-based protocols with scheduling mechanisms • Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. • Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. • Some scheduling schemes also consider battery characteristics.  Other protocols are those MAC protocols that do not strictly fall under the above categories.