SlideShare a Scribd company logo
1 of 19
Download to read offline
YEAR- 2018-19
SUBMMITTED TO
CSA DEPARTMENT
SUBMMITTED BY
DUSHHYANT KUMAR
MEDIUM ACCESS CONTROL 1
MEDIUM ACCESS CONTROL
2
 The major issues that affect the design,
deployment, & performance of an ad hoc
wireless network system are
 Medium Access Control (MAC)
 The primary responsibility of a Medium Access Control
(MAC) protocol in ad hoc wireless networks is the
distributed arbitration for the shared channel for
transmission of packets.
 The major issues to be considered in designing a MAC
protocol for ad hoc wireless networks are as follows :
MEDIUM ACCESS CONTROL
3
1. Distributed Operation
2. Synchronization
3. Hidden Terminals
4. Exposed terminals
5. Throughput
6. Access delay
7. Fairness
8. Real-time Traffic support
9. Resource reservation
10. Ability to measure resource availability
11. Capability for power control
12. Adaptive rate control
13. Use of directional antennas
MEDIUM ACCESS CONTROL
4
Distributed Operation
 Ad hoc wireless network do not have central coordinator to
distribute bandwidth fairly among nodes.
 Therefore nodes must be scheduled in a distributed fashion for
gaining access to the channel and for this exchange of control
information among nodes is required.
 Therefore the MAC protocol design should be fully distributed
and must make sure that the additional overhead incurred due to
this control information exchange is not Elevated.
MEDIUM ACCESS CONTROL
5
Distributed Operation
MEDIUM ACCESS CONTROL
6
Synchronization
 Synchronization is very important for bandwidth reservations by
nodes.
 The MAC protocol must take into consideration the
synchronization between nodes in the network.
 The MAC protocol design should take into account the
requirement of time synchronization. Synchronization is
mandatory for TDMA-based systems for management of
 transmission and reception slots. Synchronization involves usage
of scarce resources such as bandwidth and battery power.
 The control packets used for synchronization can also increase
collisions in the network.
MEDIUM ACCESS CONTROL
7
MEDIUM ACCESS CONTROL
8
Time Synchronization
Nodes
Nodes
Wireless Network
Wireless Network
 Hidden Terminals
 Hidden terminals are nodes that are hidden(or not reachable) from
the sender of a data transmission session, but are reachable to the
receiver of the session.
 In such cases, the hidden terminal can cause collisions at the receiver
node.The presence of hidden terminals can significantly reduce the
throughput of a MAC protocol used in ad hoc wireless networks.
 Exposed terminals
 Exposed terminals, the nodes that are in the transmission range of the
sender of an on –going session, are prevented from making a
transmission.
 In order to improve the efficiency of the MAC protocol, the exposed
nodes should be allowed to transmit in a controlled fashion without
causing collision to the on-going data transfer.
MEDIUM ACCESS CONTROL
9
MEDIUM ACCESS CONTROL
10
Throughput
 The MAC protocol employed in ad hoc wireless networks should
attempt to maximize the throughput of the system.
 The important considerations for throughput enhancement are
 Minimizing the occurrence of collisions.
 Maximizing channel utilization and Minimizing control overhead.
MEDIUM ACCESS CONTROL
11
Access delay
 The average delay that any packet experiences to get transmitted.
The MAC protocol should attempt to minimize the delay.
Fairness
 Fairness refers to the ability of the MAC protocols to provide an
equivalent share or weighted share of the bandwidth to all
competing nodes.
 Fairness can be either node-based or flow based.
 The former attempts to provide an equal bandwidth to all
competing nodes where the later provides an equal share for
competing data transfer session.
MEDIUM ACCESS CONTROL
12
 In ad hoc wireless network fairness is important due to the multi-
hop relying done by the node.
MEDIUM ACCESS CONTROL
13
FairnessDistribution
Real-time Traffic support
 In a contention-based channel access environment, without any
central coordination, with limited bandwidth, and with location-
dependent contention, supporting time- sensitive traffic such as
voice, video, and real-time data requires explicit support from the
MAC protocol.
Resource reservation
 The provisioning of QoS defined by parameters such as
bandwidth, delay, and jitter requires reservation of resources such
as bandwidth,buffer space,and processing power.
MEDIUM ACCESS CONTROL
14
Ability to measure resource availability
 In order to handle the resources such as bandwidth efficiently and
perform call admission control based on their availability, the
MAC protocol should be able to provide an estimation of resource
availability at every node.
 This can also be used for making congestion control decisions.
MEDIUM ACCESS CONTROL
15
 Capability for power control
 The transmission power control reduces the energy consumption at
the nodes, causes a decrease in interference at neighboring nodes,
and increases frequency reuse.
 Support for power control at the MAC layer is very important in the ad
hoc wireless environment.
 Adaptive rate control
 This refers to the variation in the data bit rate achieved over a
channel.
 A MAC protocol that has adaptive rate control can make use of a high
data rate when the sender and receiver are nearby & adaptively
reduce the data rate as they move away from each other.
MEDIUM ACCESS CONTROL
16
 Use of directional antennas
 This has many advantages that include increased spectrum reuse,
Reduction in interference and Reduced power consumption.
 MAC protocols that use omni directional antennas do not work with
directional antennas.
MEDIUM ACCESS CONTROL
17
Adaptive Rate Control
Topology control with Directional Antennas
MEDIUM ACCESS CONTROL
18
MEDIUM ACCESS CONTROL
19

More Related Content

What's hot

Common protocols
Common protocolsCommon protocols
Common protocolsMr SMAK
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsTarek Nader
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed SystemsRitu Ranjan Shrivastwa
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 

What's hot (20)

Common protocols
Common protocolsCommon protocols
Common protocols
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Improving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systemsImproving coverage and capacity in cellular systems
Improving coverage and capacity in cellular systems
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Power control in 3 g
Power control in 3 gPower control in 3 g
Power control in 3 g
 
Processor allocation in Distributed Systems
Processor allocation in Distributed SystemsProcessor allocation in Distributed Systems
Processor allocation in Distributed Systems
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Csma
CsmaCsma
Csma
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Similar to Issues In Adhoc Wireless Network

Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Easy n Inspire L
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptxHirazNor
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsIOSR Journals
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
 

Similar to Issues In Adhoc Wireless Network (20)

Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Ad Hoc.pptx
Ad Hoc.pptxAd Hoc.pptx
Ad Hoc.pptx
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
 

Recently uploaded

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Issues In Adhoc Wireless Network

  • 1. YEAR- 2018-19 SUBMMITTED TO CSA DEPARTMENT SUBMMITTED BY DUSHHYANT KUMAR MEDIUM ACCESS CONTROL 1
  • 3.  The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are  Medium Access Control (MAC)  The primary responsibility of a Medium Access Control (MAC) protocol in ad hoc wireless networks is the distributed arbitration for the shared channel for transmission of packets.  The major issues to be considered in designing a MAC protocol for ad hoc wireless networks are as follows : MEDIUM ACCESS CONTROL 3
  • 4. 1. Distributed Operation 2. Synchronization 3. Hidden Terminals 4. Exposed terminals 5. Throughput 6. Access delay 7. Fairness 8. Real-time Traffic support 9. Resource reservation 10. Ability to measure resource availability 11. Capability for power control 12. Adaptive rate control 13. Use of directional antennas MEDIUM ACCESS CONTROL 4
  • 5. Distributed Operation  Ad hoc wireless network do not have central coordinator to distribute bandwidth fairly among nodes.  Therefore nodes must be scheduled in a distributed fashion for gaining access to the channel and for this exchange of control information among nodes is required.  Therefore the MAC protocol design should be fully distributed and must make sure that the additional overhead incurred due to this control information exchange is not Elevated. MEDIUM ACCESS CONTROL 5
  • 7. Synchronization  Synchronization is very important for bandwidth reservations by nodes.  The MAC protocol must take into consideration the synchronization between nodes in the network.  The MAC protocol design should take into account the requirement of time synchronization. Synchronization is mandatory for TDMA-based systems for management of  transmission and reception slots. Synchronization involves usage of scarce resources such as bandwidth and battery power.  The control packets used for synchronization can also increase collisions in the network. MEDIUM ACCESS CONTROL 7
  • 8. MEDIUM ACCESS CONTROL 8 Time Synchronization Nodes Nodes Wireless Network Wireless Network
  • 9.  Hidden Terminals  Hidden terminals are nodes that are hidden(or not reachable) from the sender of a data transmission session, but are reachable to the receiver of the session.  In such cases, the hidden terminal can cause collisions at the receiver node.The presence of hidden terminals can significantly reduce the throughput of a MAC protocol used in ad hoc wireless networks.  Exposed terminals  Exposed terminals, the nodes that are in the transmission range of the sender of an on –going session, are prevented from making a transmission.  In order to improve the efficiency of the MAC protocol, the exposed nodes should be allowed to transmit in a controlled fashion without causing collision to the on-going data transfer. MEDIUM ACCESS CONTROL 9
  • 11. Throughput  The MAC protocol employed in ad hoc wireless networks should attempt to maximize the throughput of the system.  The important considerations for throughput enhancement are  Minimizing the occurrence of collisions.  Maximizing channel utilization and Minimizing control overhead. MEDIUM ACCESS CONTROL 11
  • 12. Access delay  The average delay that any packet experiences to get transmitted. The MAC protocol should attempt to minimize the delay. Fairness  Fairness refers to the ability of the MAC protocols to provide an equivalent share or weighted share of the bandwidth to all competing nodes.  Fairness can be either node-based or flow based.  The former attempts to provide an equal bandwidth to all competing nodes where the later provides an equal share for competing data transfer session. MEDIUM ACCESS CONTROL 12
  • 13.  In ad hoc wireless network fairness is important due to the multi- hop relying done by the node. MEDIUM ACCESS CONTROL 13 FairnessDistribution
  • 14. Real-time Traffic support  In a contention-based channel access environment, without any central coordination, with limited bandwidth, and with location- dependent contention, supporting time- sensitive traffic such as voice, video, and real-time data requires explicit support from the MAC protocol. Resource reservation  The provisioning of QoS defined by parameters such as bandwidth, delay, and jitter requires reservation of resources such as bandwidth,buffer space,and processing power. MEDIUM ACCESS CONTROL 14
  • 15. Ability to measure resource availability  In order to handle the resources such as bandwidth efficiently and perform call admission control based on their availability, the MAC protocol should be able to provide an estimation of resource availability at every node.  This can also be used for making congestion control decisions. MEDIUM ACCESS CONTROL 15
  • 16.  Capability for power control  The transmission power control reduces the energy consumption at the nodes, causes a decrease in interference at neighboring nodes, and increases frequency reuse.  Support for power control at the MAC layer is very important in the ad hoc wireless environment.  Adaptive rate control  This refers to the variation in the data bit rate achieved over a channel.  A MAC protocol that has adaptive rate control can make use of a high data rate when the sender and receiver are nearby & adaptively reduce the data rate as they move away from each other. MEDIUM ACCESS CONTROL 16
  • 17.  Use of directional antennas  This has many advantages that include increased spectrum reuse, Reduction in interference and Reduced power consumption.  MAC protocols that use omni directional antennas do not work with directional antennas. MEDIUM ACCESS CONTROL 17 Adaptive Rate Control
  • 18. Topology control with Directional Antennas MEDIUM ACCESS CONTROL 18