SlideShare a Scribd company logo
1 of 23
MAC Layer Protocols for
Wireless Networks
What is MAC?
 MAC stands for Media Access Control. A MAC
layer protocol is the protocol that controls
access to the physical transmission medium on
a LAN.
 It tries to ensure that no two nodes are
interfering with each other’s transmissions,
and deals with the situation when they do.
CSMA/CD MAC
 CSMA/CD architecture used in Ethernet is a
common MAC layer standard.
 It acts as an interface between the Logical
Link Control sublayer and the network's
Physical layer.
Normal Ethernet Operation
A
B
D
Data
C
Address mismatch
packet discarded
Address mismatch
packet discarded
Address match
packet processed
Send data
to node D
Transmitted packet seen
by all stations on the LAN
(broadcast medium)
Ethernet Collisions
A
B C
D
Collision
Data transmission for A
Data transmission for C
Ethernet Transmission Flowchart
transmit packet
assemble packet
deferring
on?
start
transmission
send jam signal
increment attempts
compute and wait
backoff time
done excessive
collision errors
done
transmit ok
transmission
done
?
yes
no yes
yes
no
no
yes
collision
detect?
too many
attempts
?
Interference / Collisions
Interference on node b
(“Hidden terminal problem”)
a
b
c
a b
a
b
c d
Interference on node b
a and b interfere and hear noise only
Packets which suffered
collisions should be re-sent.
Ideally, we would want all
packets to be sent collision-
free, only once…
 Contention-based protocols
 CSMA — Carrier Sense Multiple Access
 Ethernet (CSMA/CD) is not enough for wireless
(collision at receiver cannot detect at sender)
MACA Protocol
A B C
Hidden terminal: A is hidden from C’s CS
Hidden Terminal Problem
A and C want to send data to B
1. A senses medium idle and sends data
2. C senses medium idle and sends data
3. Collision occurs at B
A B C
Data Data
Collision Avoidance w/ RTS/CTS
A and C want to send to B
1. A sends RTS (Request To Send) to B
2. B sends CTS (Clear To Send) to A
C “overhears” CTS from B
3. C waits for duration of A’s transmission
A B
C
1.RTS
2.CTS
2.CTS
3.Data
Overview of MAC Protocols
 Contention-based protocols (contd.)
 MACAW — improved over MACA
 RTS/CTS/DATA/ACK
 Fast error recovery at link layer
 IEEE 802.11 Distributed Coordination
Function (DCF)
 Largely based on MACAW
 Called CSMA/CA
802.11 DCF (Distributed
Coordinate Function)
 Station listens before transmission
 If medium is free for more than DIFS: transmits
 Otherwise, uses exponential backoff mechanism
Interframe space (IFS)
 SIFS : used by ACK, CTS, poll response
(short)
 PIFS : used by PC (point coordinator) when
issuing polls
(point)
 DIFS : used by ordinary asynchronous traffic
(distributed)
IEEE 802.11 DCF
 Distributed coordinate function: ad hoc mode
 Virtual and physical carrier sense (CS)
 Network allocation vector (NAV), duration field
 Binary exponential backoff
 RTS/CTS/DATA/ACK for unicast packets
 Broadcast packets are directly sent after CS
Virtual Carrier Sense
 Timing relationship
Random Backoff
 Pick a timeslot chosen uniformly in [0, CW]
 Listen up to chosen slot
 Transmit if nobody else started transmitting
 Wait if somebody else started transmitting
Time
Example: A Successful
Transmission
 A and B happened to choose different slots
 Node A chooses slot 4, hears nothing,
transmits
 Node B chooses slot 8, hears Node A, waits
Success: exactly one node in first non-vacant slot
Node A:
Node B:
Slot choice (slot #4)
Slot choice (slot #8)
Time
Example: A Collision
 A and B happened to choose slot 4
 Both listen and hear nothing
 Both transmit simultaneously
Collision: ≥ 2 nodes in first non-vacant slot
Node A:
Node B:
Slot choice (slot #4)
Slot choice (slot #4)
Time
High Contention Causes Collisions in CSMA
Uniform distribution “fills up,” quickly
Unacceptable collision rate above
~15 transmitting sensors
Binary Exponential Backoff
(BEB)
• Creating more slots for solving the collision
problem
Problems with BEB
 Takes time for every node to increase CW
 Especially if traffic is spatially-correlated and
bursty
 Waste backoff slots if collisions cause CW to
increase
BEB causes performance to suffer
Q&A

More Related Content

Similar to MAC.ppt

F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..webhostingguy
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batchJaimin Jani
 
link layer
link layerlink layer
link layerGS Kosta
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Lan switching technologies
Lan switching technologiesLan switching technologies
Lan switching technologiesMohammedseleim
 
Resolving data collision in csma via protocols
Resolving data collision in csma via protocolsResolving data collision in csma via protocols
Resolving data collision in csma via protocolsAnurag Singh
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la nsKhánh Ghẻ
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CASoumen Santra
 
2.Phys & Link
2.Phys & Link2.Phys & Link
2.Phys & Linkphanleson
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 

Similar to MAC.ppt (20)

F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
Link layer
Link layerLink layer
Link layer
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
link layer
link layerlink layer
link layer
 
Adhoc network ppt
Adhoc network pptAdhoc network ppt
Adhoc network ppt
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Mac
MacMac
Mac
 
Lan switching technologies
Lan switching technologiesLan switching technologies
Lan switching technologies
 
Resolving data collision in csma via protocols
Resolving data collision in csma via protocolsResolving data collision in csma via protocols
Resolving data collision in csma via protocols
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Chapter5 link layer and la ns
Chapter5 link layer and la nsChapter5 link layer and la ns
Chapter5 link layer and la ns
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
2.Phys & Link
2.Phys & Link2.Phys & Link
2.Phys & Link
 
Topic5
Topic5Topic5
Topic5
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 

More from Santhosh Krishna

More from Santhosh Krishna (16)

CIRCULAR-–-Introduction-to-Open-Elective-Guidelines..pdf
CIRCULAR-–-Introduction-to-Open-Elective-Guidelines..pdfCIRCULAR-–-Introduction-to-Open-Elective-Guidelines..pdf
CIRCULAR-–-Introduction-to-Open-Elective-Guidelines..pdf
 
dijkstra algo.ppt
dijkstra algo.pptdijkstra algo.ppt
dijkstra algo.ppt
 
ICT Training.pptx
ICT Training.pptxICT Training.pptx
ICT Training.pptx
 
adv.pdf
adv.pdfadv.pdf
adv.pdf
 
ResearchDesignppt.pptx
ResearchDesignppt.pptxResearchDesignppt.pptx
ResearchDesignppt.pptx
 
module2_cie1.ppt
module2_cie1.pptmodule2_cie1.ppt
module2_cie1.ppt
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
IIot_Keynote.pptx
IIot_Keynote.pptxIIot_Keynote.pptx
IIot_Keynote.pptx
 
UMTS_and_beyond.ppt
UMTS_and_beyond.pptUMTS_and_beyond.ppt
UMTS_and_beyond.ppt
 
chapter_7.ppt
chapter_7.pptchapter_7.ppt
chapter_7.ppt
 
IoT and Smart Cities
IoT and Smart CitiesIoT and Smart Cities
IoT and Smart Cities
 
Opportunities and Challenges in Open,Distance and e-Learning -ODEL
Opportunities and Challenges in Open,Distance and e-Learning -ODELOpportunities and Challenges in Open,Distance and e-Learning -ODEL
Opportunities and Challenges in Open,Distance and e-Learning -ODEL
 
Cn sylb reg 2017
Cn sylb reg 2017Cn sylb reg 2017
Cn sylb reg 2017
 
Wn vt
Wn vtWn vt
Wn vt
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

MAC.ppt

  • 1. MAC Layer Protocols for Wireless Networks
  • 2. What is MAC?  MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access to the physical transmission medium on a LAN.  It tries to ensure that no two nodes are interfering with each other’s transmissions, and deals with the situation when they do.
  • 3. CSMA/CD MAC  CSMA/CD architecture used in Ethernet is a common MAC layer standard.  It acts as an interface between the Logical Link Control sublayer and the network's Physical layer.
  • 4.
  • 5. Normal Ethernet Operation A B D Data C Address mismatch packet discarded Address mismatch packet discarded Address match packet processed Send data to node D Transmitted packet seen by all stations on the LAN (broadcast medium)
  • 6. Ethernet Collisions A B C D Collision Data transmission for A Data transmission for C
  • 7. Ethernet Transmission Flowchart transmit packet assemble packet deferring on? start transmission send jam signal increment attempts compute and wait backoff time done excessive collision errors done transmit ok transmission done ? yes no yes yes no no yes collision detect? too many attempts ?
  • 8. Interference / Collisions Interference on node b (“Hidden terminal problem”) a b c a b a b c d Interference on node b a and b interfere and hear noise only Packets which suffered collisions should be re-sent. Ideally, we would want all packets to be sent collision- free, only once…
  • 9.  Contention-based protocols  CSMA — Carrier Sense Multiple Access  Ethernet (CSMA/CD) is not enough for wireless (collision at receiver cannot detect at sender) MACA Protocol A B C Hidden terminal: A is hidden from C’s CS
  • 10. Hidden Terminal Problem A and C want to send data to B 1. A senses medium idle and sends data 2. C senses medium idle and sends data 3. Collision occurs at B A B C Data Data
  • 11. Collision Avoidance w/ RTS/CTS A and C want to send to B 1. A sends RTS (Request To Send) to B 2. B sends CTS (Clear To Send) to A C “overhears” CTS from B 3. C waits for duration of A’s transmission A B C 1.RTS 2.CTS 2.CTS 3.Data
  • 12. Overview of MAC Protocols  Contention-based protocols (contd.)  MACAW — improved over MACA  RTS/CTS/DATA/ACK  Fast error recovery at link layer  IEEE 802.11 Distributed Coordination Function (DCF)  Largely based on MACAW  Called CSMA/CA
  • 13. 802.11 DCF (Distributed Coordinate Function)  Station listens before transmission  If medium is free for more than DIFS: transmits  Otherwise, uses exponential backoff mechanism
  • 14. Interframe space (IFS)  SIFS : used by ACK, CTS, poll response (short)  PIFS : used by PC (point coordinator) when issuing polls (point)  DIFS : used by ordinary asynchronous traffic (distributed)
  • 15. IEEE 802.11 DCF  Distributed coordinate function: ad hoc mode  Virtual and physical carrier sense (CS)  Network allocation vector (NAV), duration field  Binary exponential backoff  RTS/CTS/DATA/ACK for unicast packets  Broadcast packets are directly sent after CS
  • 16. Virtual Carrier Sense  Timing relationship
  • 17. Random Backoff  Pick a timeslot chosen uniformly in [0, CW]  Listen up to chosen slot  Transmit if nobody else started transmitting  Wait if somebody else started transmitting Time
  • 18. Example: A Successful Transmission  A and B happened to choose different slots  Node A chooses slot 4, hears nothing, transmits  Node B chooses slot 8, hears Node A, waits Success: exactly one node in first non-vacant slot Node A: Node B: Slot choice (slot #4) Slot choice (slot #8) Time
  • 19. Example: A Collision  A and B happened to choose slot 4  Both listen and hear nothing  Both transmit simultaneously Collision: ≥ 2 nodes in first non-vacant slot Node A: Node B: Slot choice (slot #4) Slot choice (slot #4) Time
  • 20. High Contention Causes Collisions in CSMA Uniform distribution “fills up,” quickly Unacceptable collision rate above ~15 transmitting sensors
  • 21. Binary Exponential Backoff (BEB) • Creating more slots for solving the collision problem
  • 22. Problems with BEB  Takes time for every node to increase CW  Especially if traffic is spatially-correlated and bursty  Waste backoff slots if collisions cause CW to increase BEB causes performance to suffer
  • 23. Q&A