SlideShare a Scribd company logo
UNIT-II
MAC PROTOCOLS FOR WIRELESS SENSOR
NETWORKS
Contents:
 Issues in Designing a MAC protocol for Ad-hoc Wireless
Networks
 Design goals of a MAC Protocol for Ad-hoc Wireless
Networks
 Classifications of MAC Protocols
 Contention-Based Protocols
 Contention-Based Protocols with reservation Mechanisms
 Contention-Based MAC Protocols with Scheduling Mechanisms
 MAC Protocols that use Directional Antennas, Other MAC
1
INTRODUCTION TO MAC:
 Nodes in an Ad-hoc wireless network share a common
broadcast radio channel. Since the radio spectrum is
limited, the bandwidth available for communication in
such networks is also limited.
 Access to this shared medium should be controlled in
such a manner that all nodes receive a fair share of the
available bandwidth, and that the bandwidth is utilized
efficiently.
 Characteristics of the wireless medium are completely
different from wired medium.
 So a different set of protocols is required for controlling
access to the shared medium in such networks. This is
achieved by using Medium Access Control (MAC)
protocol.
2
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
 Bandwidth Efficiency:
 Since the radio spectrum is limited, the bandwidth available for
communication is also very limited. The MAC protocol must be
designed in such a way that to maximize this bandwidth
efficiency (the ratio of the bandwidth used for actual data
transmission to the total available bandwidth).
 That is the uncommon bandwidth is utilized in an efficient
manner.
 Quality of Service Support(QoS):
 Providing QoS support to data sessions in Ad-hoc networks is
very difficult due to their characteristic nature of nodes mobility.
 Most of the time, Bandwidth reservation made at one point of
time may become invalid once the node moves out of the region.
 The MAC protocol for Ad-hoc wireless networks that are to be
used in such real-time applications must have resource
reservation mechanism take care of nature of the wireless
channel and the mobility of nodes.
3
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
 Synchronization:
 The MAC protocol must take into consideration the
synchronization between nodes in the network.
 Synchronization is very important for bandwidth (time slot)
reservations by nodes achieved by exchange of control packets.
 Hidden and Exposed Terminal Problems:
 The hidden terminal problem refers to the collision of packets at
a receiving node due to the simultaneous transmission of those
nodes.
 The exposed terminal problem refers to the inability of a node,
which is blocked due to transmission by a nearby transmitting
node, to transmit to another node.
 Mobility of Nodes:
 This is a very important factor affecting the performance
(throughput) of the protocol.
 The MAC protocol obviously has no role to play in influencing
the mobility of the nodes.
4
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
 Error-Prone Shared Broadcast Channel:
 Due to broadcast nature of the radio channel (transmissions
made by a node are received by all nodes within its direct
transmission range) there is a possibility of packet collisions is
quite high in wireless networks.
 A MAC protocol should grant channel access to nodes in such a
manner that collisions are minimized.
 Distributed Nature/Lack of Central Coordination
 Ad hoc wireless networks do not have centralized coordinators
because nodes keep moving continuously.
 Therefore, nodes must be scheduled in a distributed fashion for
gaining access to the channel.
 The MAC protocol must make sure that the additional overhead,
in terms of bandwidth consumption is not very high.
5
Design goals of a MAC Protocol for Ad-hoc Wireless
Networks:
 The operation of the protocol should be distributed.
 The protocol should provide QoS support for real-time traffic.
 The access delay, which refers to the average delay experienced
by any packet to get transmitted, must be kept low.
 The available bandwidth must be utilized efficiently.
 The protocol should ensure fair allocation of bandwidth to
nodes.
 Control overhead must be kept as low as possible.
 The protocol should minimize the effects of hidden and exposed
terminal problems.
 The protocol must be scalable to large networks.
 It should have power control mechanisms.
 The protocol should have mechanisms for adaptive data rate
control.
 It should try to use directional antennas.
 The protocol should provide synchronization among nodes.
6
Classifications of MAC Protocols:
 Ad hoc network MAC protocols can be classified into three types:
 Contention-based protocols
 Contention-based protocols with reservation mechanisms
 Contention-based protocols with scheduling mechanisms
 Other MAC protocols
7
Classifications of MAC Protocols:
 Contention-based protocols:
 Sender-initiated protocols: Packet transmissions are initiated
by the sender node.
 Single-channel sender-initiated protocols: A node that
wins the contention to the channel can make use of the
entire bandwidth.
 Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
 Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
 Contention-based protocols with reservation mechanisms
 Synchronous protocols: All nodes need to be synchronized.
Global time synchronization is difficult to achieve.
 Asynchronous protocols: These protocols use relative time
information for effecting reservations.
8
Classifications of MAC Protocols:
 Contention-based protocols with scheduling mechanisms:
 Node scheduling is done in a manner so that all nodes are
treated fairly and no node is starved of bandwidth.
 Scheduling-based schemes are also used for enforcing
priorities among flows whose packets are queued at nodes.
 Some scheduling schemes also consider battery
characteristics.
 Other protocols are those MAC protocols : These are not
strictly fall under the above categories.
9
Classifications of MAC Protocols:
 Contention-based protocols :
 Single-channel sender-initiated protocols:
EXAMPLES: MACAW, FAMA
MACAW: A Media Access Protocol for Wireless LANs is based on
MACA (Multiple Access Collision Avoidance) Protocol
MACA:-
 When a node wants to transmit a data packet, it
first transmit a RTS (Request To Send) frame.
 The receiver node, on receiving the RTS packet,
if it is ready to receive the data packet,
transmits a CTS (Clear to Send) packet.
 Once the sender receives the CTS packet
without any error, it starts transmitting the
data packet.
 If a packet transmitted by a node is lost, the
node uses the Binary Exponential Back-off
(BEB) algorithm to back-off a random interval
of time before retrying. The problem is solved
by MACAW
10
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Single-channel sender-initiated protocols:
MACA EXAMPLES:
 MACA avoids the problem of hidden terminals
 A and C want to send to B
 A sends RTS first
 C waits after receiving
CTS from B
 MACA avoids the problem of exposed terminals
 B wants to send to A, C
to another terminal
 now C does not have
to wait for it cannot
receive CTS from A
11
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Single-channel sender-initiated protocols:
MACAW: (MACA for Wireless) is a revision of
MACA.
 The sender transmits a RTS (Request To
Send) frame if no nearby station transmits a
RTS.
 The receiver replies with a CTS (Clear To
Send) frame.
 Neighbors
o see CTS, then keep quiet.
o see RTS but not CTS, then keep quiet
until the CTS is back to the sender.
 The receiver sends an ACK when receiving an
frame.
o Neighbors keep silent until see ACK.
 Collisions
o There is no collision detection.
o The senders know collision when they
don’t receive CTS.
o They each wait for the exponential back-
off time.
12
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Single-channel sender-initiated protocols:
FAMA: Floor Acquisition Multiple Access Protocols.
 Channel access consists of a carrier-sensing operation and a collision
avoidance
 Carrier-sensing by the sender, followed by the RTS-CTS control packet
exchange.
 Data transmission to be collision free, the duration of an RTS must be at
least twice the maximum channel propagation delay
 Two FAMA protocol variants
 RTS-CTS exchange with no carrier sensing (MACA)
 RTS-CTS exchange with non-persistent carrier sensing (FAMA-NTR)
FAMA-NTR(Non-persistent Transmit Request)
 Before sending a packet, the sender senses the channel
 If channel is busy, the sender back-off a random time and retries later
 If the channel is free, the sender sends RTS and waits for a CTS packet
 If the sender cannot receive a CTS, it takes a random back-off and retries
later
 If the sender receives a CTS, it can start transmission data packet
 In order to allow the sender to send a burst of packets, the receiver is made
to wait a time duration τ seconds after a packet is received.
13
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Multi-channel sender-initiated protocols:
 Busy Tone Multiple Access Protocols (BTMA):
 The transmission channel is split into two parts:
 a data channel for data packet transmissions
 a control channel used to transmit the busy tone signal
 When a node is ready for transmission, it senses the channel to
check whether the busy tone is active.
 If not, it turns on the busy tone signal and starts data
transmissions.
 Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
 Dual Busy Tone Multiple Access Protocol (DBTMAP) is an extension of
the BTMA scheme.
 a data channel for data packet transmissions
 a control channel used for control packet transmissions (RTS
and CTS packets) and also for transmitting the busy tones.
 Use two busy tones on the control channel, BTt and BTr.
 BTt : indicate that it is transmitting on the data channel
 BTr: indicate that it is receiving on the data channel
 Two busy tone signals are two sine waves at different
frequencies
14
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Receiver-initiated protocols:
 RI-BTMA: Receiver-Initiated Busy Tone Multiple Access Protocol
 The transmission channel is split into two:
• a data channel for data packet transmissions
• a control channel used for transmitting the busy tone signal
 A node can transmit on the data channel only if it finds the
busy tone to be absent on the control channel.
 The data packet is divided into two portions: a preamble and
the actual data packet.
 MACA-BI: MACA-By Invitation
 By eliminating the need for the RTS packet it reduces the
number of control packets used in the MACA protocol which
uses the three-way handshake mechanism.
 MARCH: Media Access with Reduced Handshake. 15
Classifications of MAC Protocols:
 Contention-based protocols : …cntd
 Receiver-initiated protocols:
16
Classifications of MAC Protocols:
 Contention-based Protocols with Reservation Mechanism:
 Contention occurs during the resource (bandwidth) reservation
phase.
 Once the bandwidth is reserved, the node gets exclusive access to the
reserved bandwidth.
 QoS support can be provided for real-time traffic.
Synchronous protocols:
 Distributed Packet Reservation Multiple Access Protocol(D-PRMA)
 It extends the centralized packet reservation multiple access
(PRMA) scheme into a distributed scheme that can be used in ad
hoc wireless networks.
 PRMA was designed in a wireless LAN with a base station.
 D-PRMA is a TDMA-based scheme. The channel is divided into
fixed- and equal-sized frames along the time axis.
17
Classifications of MAC Protocols: …cntd
 Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
 Collision Avoidance Time Allocation Protocol(CATA):
 Support broadcast, unicast, and multicast transmissions
simultaneously.
 Each frame consists of S slots and each slot is further divided into
five Control Mini-Slots
 CMS1: Slot Reservation (SR)
 CMS2: RTS
 CMS3: CTS
 CMS4: Not To Send (NTS)
 DMS: Data transmission
18
Classifications of MAC Protocols: …cntd
 Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
 Hop Reservation Multiple Access Protocol (HRMA):
 A multichannel MAC protocol which is based on half-duplex, very
slow frequency-hopping spread spectrum (FHSS) radios
 Uses a reservation and handshake mechanism to enable a pair of
communicating nodes to reserve a frequency hop, thereby
guaranteeing collision-free data transmission.
 Can be viewed as a time slot reservation protocol where each time
slot is assigned a separate frequency channel.
19
Classifications of MAC Protocols: …cntd
 Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
 Soft Reservation Multiple Access with Priority Assignment
(SRMA/PA):
 Developed with the main objective of supporting integrated
services of real-time and non-real-time application in Ad-hoc
networks.
 Nodes use a collision-avoidance handshake mechanism and a soft
reservation mechanism.
 Five-Phase Reservation Protocol (FPRP)
 A single-channel TDMA based broadcast scheduling protocol.
 Nodes uses a contention mechanism in order to acquire time slots.
 The protocol assumes the availability of global time at all nodes.
 The reservation takes five phases:
 Reservation,
 Collision Report,
 Reservation Confirmation,
 Reservation Acknowledgement,
 Packing And Elimination Phase.
20
Classifications of MAC Protocols: …cntd
 Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
 Five-Phase Reservation Protocol (FPRP)
Five-phase protocol:
 Reservation request: send reservation request (RR) packet to dest.
 Collision report: if a collision is detected by any node, that node
broadcasts a CR packet
 Reservation confirmation: a source node won the contention will
send a RC packet to destination node if it does not receive any CR
message in the previous phase
 Reservation acknowledgment: destination node acknowledge
reception of RC by sending back RA message to source
 Packing and elimination: use packing packet and elimination packet.
21
Classifications of MAC Protocols: …cntd
 Contention-based Protocols with Reservation Mechanism:
Asynchronous protocols:
 MACA with Piggy-Backed Reservation (MACA/PR):
 Provide real-time traffic support in multi-hop wireless networks
 Based on the MACAW protocol with non-persistent CSMA
 The main components of MACA/PR are:
 A MAC protocol
 A reservation protocol
 A QoS routing protocol
 Real-Time Medium Access Control Protocol (RTMAC)
 Provides a bandwidth reservation mechanism for supporting real-
time traffic in ad-hoc wireless networks
 RTMAC has two components
 A MAC layer protocol is a real-time extension of the IEEE 802.11
DCF.
o A medium-access protocol for best-effort traffic
o A reservation protocol for real-time traffic
 A QoS routing protocol is responsible for end-to-end reservation
and release of bandwidth resources.
22
Classifications of MAC Protocols:
 Contention-based protocols with Scheduling Mechanism:
 Protocols in this category focus on packet scheduling at the
nodes and transmission scheduling of the nodes.
 The factors that affects scheduling decisions
• Delay targets of packets
• Traffic load at nodes
• Battery power
 Distributed priority scheduling and medium access in Ad Hoc
Networks present two mechanisms for providing quality of
service (QoS)
• Distributed priority scheduling (DPS) – Piggy-backs the priority
tag of a node’s current and head-of-line packets to the control and
data packets
• Multi-hop coordination – Extends the DPS scheme to carry out
scheduling over multi-hop paths.
23
Classifications of MAC Protocols: …cntd
 Contention-based protocols with Scheduling Mechanism:
• Distributed Wireless Ordering Protocol (DWOP)
• A media access scheme along with a scheduling mechanism
based on the distributed priority scheduling scheme
• Distributed Laxity-based Priority Scheduling (DLPS)
Scheme
• Scheduling decisions are made based on the states of
neighboring nodes and feed back from destination nodes
regarding packet losses
• Packets are recorded based on their uniform laxity budgets
(ULBs) and the packet delivery ratios of the flows. The laxity
of a packet is the time remaining before its deadline. 24
Classifications of MAC Protocols:
 MAC Protocols that use directional Antennas:
 MAC protocols that use directional antennas have several
advantages:
• Reduce signal interference
• Increase in the system throughput
• Improved channel reuse
 MAC protocol using directional antennas
• Make use of an RTS/CTS exchange mechanism
• Use directional antennas for transmitting and receiving data
packets
 Directional Busy Tone-based MAC Protocol (D-BTMA)
• It uses directional antennas for transmitting the RTS, CTS, data
frames, and the busy tones.
 Directional MAC Protocols for Ad Hoc Wireless Networks
• DMAC-1: A directional antenna is used for transmitting RTS
packets and Omni-directional antenna for CTS packets.
• DMAC-1, both directional RTS and omni-directional RTS
transmission are used.
25
Classifications of MAC Protocols: …cntd
 MAC Protocols that use directional Antennas:
26
Classifications of MAC Protocols: …cntd
 Other MAC Protocols:
 Multi-channel MAC Protocol (MMAC)
 Multiple channels for data transmission
 There is no dedicated control channel.
 Based on channel usage channels can be classified into three
types: high, medium and low preference channels.
 Multi-channel Carrier Sense Multiple Access(MCSMA) MAC
Protocol :
 The available bandwidth is divided into several channels
 Power Control MAC Protocol (PCM) for Ad Hoc Networks
 Allows nodes to vary their transmission power levels on a per-
packet basis
 Receiver-based Autorate Protocol (RBAR)
 Use a rate adaptation approach
 Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
 The available bandwidth is split into tow equal channels
 The handshaking process is interleaved between the two
channels.
27
Note: A directional antenna or beam antenna is an antenna which
radiates or receives greater power in specific directions allowing
for increased performance and reduced interference from
unwanted sources.
Note: Omnidirectional refers to the notion(feeling) of
existing in every direction. Omnidirectional antenna is that
radiates equally in all directions.
Note: Handshaking is the exchange of information between
two modems and the resulting agreement about which
protocol to use that precedes each telephone connection.
28

More Related Content

Similar to 14653128.ppt

Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
mmjalbiaty
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
Easy n Inspire L
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
HirazNor
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
Wendy Hager
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
IOSR Journals
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Akansha Verma
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Mac
MacMac
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
Prasant Misra
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
Krithika242242
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
diala wedyan
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
pijans
 
ShortPaper
ShortPaperShortPaper
ShortPaper
Sivamoorthy Ranjan
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
ssuserc02c1f
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
swayambhoo
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Mridula Sharma
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
Deepak John
 

Similar to 14653128.ppt (20)

Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Mac
MacMac
Mac
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptxThesis Presentation on Renewal theory based 802.15.6 latest.pptx
Thesis Presentation on Renewal theory based 802.15.6 latest.pptx
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 

Recently uploaded

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

14653128.ppt

  • 1. UNIT-II MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS Contents:  Issues in Designing a MAC protocol for Ad-hoc Wireless Networks  Design goals of a MAC Protocol for Ad-hoc Wireless Networks  Classifications of MAC Protocols  Contention-Based Protocols  Contention-Based Protocols with reservation Mechanisms  Contention-Based MAC Protocols with Scheduling Mechanisms  MAC Protocols that use Directional Antennas, Other MAC 1
  • 2. INTRODUCTION TO MAC:  Nodes in an Ad-hoc wireless network share a common broadcast radio channel. Since the radio spectrum is limited, the bandwidth available for communication in such networks is also limited.  Access to this shared medium should be controlled in such a manner that all nodes receive a fair share of the available bandwidth, and that the bandwidth is utilized efficiently.  Characteristics of the wireless medium are completely different from wired medium.  So a different set of protocols is required for controlling access to the shared medium in such networks. This is achieved by using Medium Access Control (MAC) protocol. 2
  • 3. Issues in Designing MAC Protocol for Ad-hoc Wireless Networks:  Bandwidth Efficiency:  Since the radio spectrum is limited, the bandwidth available for communication is also very limited. The MAC protocol must be designed in such a way that to maximize this bandwidth efficiency (the ratio of the bandwidth used for actual data transmission to the total available bandwidth).  That is the uncommon bandwidth is utilized in an efficient manner.  Quality of Service Support(QoS):  Providing QoS support to data sessions in Ad-hoc networks is very difficult due to their characteristic nature of nodes mobility.  Most of the time, Bandwidth reservation made at one point of time may become invalid once the node moves out of the region.  The MAC protocol for Ad-hoc wireless networks that are to be used in such real-time applications must have resource reservation mechanism take care of nature of the wireless channel and the mobility of nodes. 3
  • 4. Issues in Designing MAC Protocol for Ad-hoc Wireless Networks:  Synchronization:  The MAC protocol must take into consideration the synchronization between nodes in the network.  Synchronization is very important for bandwidth (time slot) reservations by nodes achieved by exchange of control packets.  Hidden and Exposed Terminal Problems:  The hidden terminal problem refers to the collision of packets at a receiving node due to the simultaneous transmission of those nodes.  The exposed terminal problem refers to the inability of a node, which is blocked due to transmission by a nearby transmitting node, to transmit to another node.  Mobility of Nodes:  This is a very important factor affecting the performance (throughput) of the protocol.  The MAC protocol obviously has no role to play in influencing the mobility of the nodes. 4
  • 5. Issues in Designing MAC Protocol for Ad-hoc Wireless Networks:  Error-Prone Shared Broadcast Channel:  Due to broadcast nature of the radio channel (transmissions made by a node are received by all nodes within its direct transmission range) there is a possibility of packet collisions is quite high in wireless networks.  A MAC protocol should grant channel access to nodes in such a manner that collisions are minimized.  Distributed Nature/Lack of Central Coordination  Ad hoc wireless networks do not have centralized coordinators because nodes keep moving continuously.  Therefore, nodes must be scheduled in a distributed fashion for gaining access to the channel.  The MAC protocol must make sure that the additional overhead, in terms of bandwidth consumption is not very high. 5
  • 6. Design goals of a MAC Protocol for Ad-hoc Wireless Networks:  The operation of the protocol should be distributed.  The protocol should provide QoS support for real-time traffic.  The access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low.  The available bandwidth must be utilized efficiently.  The protocol should ensure fair allocation of bandwidth to nodes.  Control overhead must be kept as low as possible.  The protocol should minimize the effects of hidden and exposed terminal problems.  The protocol must be scalable to large networks.  It should have power control mechanisms.  The protocol should have mechanisms for adaptive data rate control.  It should try to use directional antennas.  The protocol should provide synchronization among nodes. 6
  • 7. Classifications of MAC Protocols:  Ad hoc network MAC protocols can be classified into three types:  Contention-based protocols  Contention-based protocols with reservation mechanisms  Contention-based protocols with scheduling mechanisms  Other MAC protocols 7
  • 8. Classifications of MAC Protocols:  Contention-based protocols:  Sender-initiated protocols: Packet transmissions are initiated by the sender node.  Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth.  Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels.  Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.  Contention-based protocols with reservation mechanisms  Synchronous protocols: All nodes need to be synchronized. Global time synchronization is difficult to achieve.  Asynchronous protocols: These protocols use relative time information for effecting reservations. 8
  • 9. Classifications of MAC Protocols:  Contention-based protocols with scheduling mechanisms:  Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth.  Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes.  Some scheduling schemes also consider battery characteristics.  Other protocols are those MAC protocols : These are not strictly fall under the above categories. 9
  • 10. Classifications of MAC Protocols:  Contention-based protocols :  Single-channel sender-initiated protocols: EXAMPLES: MACAW, FAMA MACAW: A Media Access Protocol for Wireless LANs is based on MACA (Multiple Access Collision Avoidance) Protocol MACA:-  When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame.  The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS (Clear to Send) packet.  Once the sender receives the CTS packet without any error, it starts transmitting the data packet.  If a packet transmitted by a node is lost, the node uses the Binary Exponential Back-off (BEB) algorithm to back-off a random interval of time before retrying. The problem is solved by MACAW 10
  • 11. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Single-channel sender-initiated protocols: MACA EXAMPLES:  MACA avoids the problem of hidden terminals  A and C want to send to B  A sends RTS first  C waits after receiving CTS from B  MACA avoids the problem of exposed terminals  B wants to send to A, C to another terminal  now C does not have to wait for it cannot receive CTS from A 11
  • 12. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Single-channel sender-initiated protocols: MACAW: (MACA for Wireless) is a revision of MACA.  The sender transmits a RTS (Request To Send) frame if no nearby station transmits a RTS.  The receiver replies with a CTS (Clear To Send) frame.  Neighbors o see CTS, then keep quiet. o see RTS but not CTS, then keep quiet until the CTS is back to the sender.  The receiver sends an ACK when receiving an frame. o Neighbors keep silent until see ACK.  Collisions o There is no collision detection. o The senders know collision when they don’t receive CTS. o They each wait for the exponential back- off time. 12
  • 13. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Single-channel sender-initiated protocols: FAMA: Floor Acquisition Multiple Access Protocols.  Channel access consists of a carrier-sensing operation and a collision avoidance  Carrier-sensing by the sender, followed by the RTS-CTS control packet exchange.  Data transmission to be collision free, the duration of an RTS must be at least twice the maximum channel propagation delay  Two FAMA protocol variants  RTS-CTS exchange with no carrier sensing (MACA)  RTS-CTS exchange with non-persistent carrier sensing (FAMA-NTR) FAMA-NTR(Non-persistent Transmit Request)  Before sending a packet, the sender senses the channel  If channel is busy, the sender back-off a random time and retries later  If the channel is free, the sender sends RTS and waits for a CTS packet  If the sender cannot receive a CTS, it takes a random back-off and retries later  If the sender receives a CTS, it can start transmission data packet  In order to allow the sender to send a burst of packets, the receiver is made to wait a time duration τ seconds after a packet is received. 13
  • 14. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Multi-channel sender-initiated protocols:  Busy Tone Multiple Access Protocols (BTMA):  The transmission channel is split into two parts:  a data channel for data packet transmissions  a control channel used to transmit the busy tone signal  When a node is ready for transmission, it senses the channel to check whether the busy tone is active.  If not, it turns on the busy tone signal and starts data transmissions.  Otherwise, it reschedules the packet for transmission after some random rescheduling delay.  Dual Busy Tone Multiple Access Protocol (DBTMAP) is an extension of the BTMA scheme.  a data channel for data packet transmissions  a control channel used for control packet transmissions (RTS and CTS packets) and also for transmitting the busy tones.  Use two busy tones on the control channel, BTt and BTr.  BTt : indicate that it is transmitting on the data channel  BTr: indicate that it is receiving on the data channel  Two busy tone signals are two sine waves at different frequencies 14
  • 15. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Receiver-initiated protocols:  RI-BTMA: Receiver-Initiated Busy Tone Multiple Access Protocol  The transmission channel is split into two: • a data channel for data packet transmissions • a control channel used for transmitting the busy tone signal  A node can transmit on the data channel only if it finds the busy tone to be absent on the control channel.  The data packet is divided into two portions: a preamble and the actual data packet.  MACA-BI: MACA-By Invitation  By eliminating the need for the RTS packet it reduces the number of control packets used in the MACA protocol which uses the three-way handshake mechanism.  MARCH: Media Access with Reduced Handshake. 15
  • 16. Classifications of MAC Protocols:  Contention-based protocols : …cntd  Receiver-initiated protocols: 16
  • 17. Classifications of MAC Protocols:  Contention-based Protocols with Reservation Mechanism:  Contention occurs during the resource (bandwidth) reservation phase.  Once the bandwidth is reserved, the node gets exclusive access to the reserved bandwidth.  QoS support can be provided for real-time traffic. Synchronous protocols:  Distributed Packet Reservation Multiple Access Protocol(D-PRMA)  It extends the centralized packet reservation multiple access (PRMA) scheme into a distributed scheme that can be used in ad hoc wireless networks.  PRMA was designed in a wireless LAN with a base station.  D-PRMA is a TDMA-based scheme. The channel is divided into fixed- and equal-sized frames along the time axis. 17
  • 18. Classifications of MAC Protocols: …cntd  Contention-based Protocols with Reservation Mechanism: Synchronous protocols:  Collision Avoidance Time Allocation Protocol(CATA):  Support broadcast, unicast, and multicast transmissions simultaneously.  Each frame consists of S slots and each slot is further divided into five Control Mini-Slots  CMS1: Slot Reservation (SR)  CMS2: RTS  CMS3: CTS  CMS4: Not To Send (NTS)  DMS: Data transmission 18
  • 19. Classifications of MAC Protocols: …cntd  Contention-based Protocols with Reservation Mechanism: Synchronous protocols:  Hop Reservation Multiple Access Protocol (HRMA):  A multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios  Uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission.  Can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel. 19
  • 20. Classifications of MAC Protocols: …cntd  Contention-based Protocols with Reservation Mechanism: Synchronous protocols:  Soft Reservation Multiple Access with Priority Assignment (SRMA/PA):  Developed with the main objective of supporting integrated services of real-time and non-real-time application in Ad-hoc networks.  Nodes use a collision-avoidance handshake mechanism and a soft reservation mechanism.  Five-Phase Reservation Protocol (FPRP)  A single-channel TDMA based broadcast scheduling protocol.  Nodes uses a contention mechanism in order to acquire time slots.  The protocol assumes the availability of global time at all nodes.  The reservation takes five phases:  Reservation,  Collision Report,  Reservation Confirmation,  Reservation Acknowledgement,  Packing And Elimination Phase. 20
  • 21. Classifications of MAC Protocols: …cntd  Contention-based Protocols with Reservation Mechanism: Synchronous protocols:  Five-Phase Reservation Protocol (FPRP) Five-phase protocol:  Reservation request: send reservation request (RR) packet to dest.  Collision report: if a collision is detected by any node, that node broadcasts a CR packet  Reservation confirmation: a source node won the contention will send a RC packet to destination node if it does not receive any CR message in the previous phase  Reservation acknowledgment: destination node acknowledge reception of RC by sending back RA message to source  Packing and elimination: use packing packet and elimination packet. 21
  • 22. Classifications of MAC Protocols: …cntd  Contention-based Protocols with Reservation Mechanism: Asynchronous protocols:  MACA with Piggy-Backed Reservation (MACA/PR):  Provide real-time traffic support in multi-hop wireless networks  Based on the MACAW protocol with non-persistent CSMA  The main components of MACA/PR are:  A MAC protocol  A reservation protocol  A QoS routing protocol  Real-Time Medium Access Control Protocol (RTMAC)  Provides a bandwidth reservation mechanism for supporting real- time traffic in ad-hoc wireless networks  RTMAC has two components  A MAC layer protocol is a real-time extension of the IEEE 802.11 DCF. o A medium-access protocol for best-effort traffic o A reservation protocol for real-time traffic  A QoS routing protocol is responsible for end-to-end reservation and release of bandwidth resources. 22
  • 23. Classifications of MAC Protocols:  Contention-based protocols with Scheduling Mechanism:  Protocols in this category focus on packet scheduling at the nodes and transmission scheduling of the nodes.  The factors that affects scheduling decisions • Delay targets of packets • Traffic load at nodes • Battery power  Distributed priority scheduling and medium access in Ad Hoc Networks present two mechanisms for providing quality of service (QoS) • Distributed priority scheduling (DPS) – Piggy-backs the priority tag of a node’s current and head-of-line packets to the control and data packets • Multi-hop coordination – Extends the DPS scheme to carry out scheduling over multi-hop paths. 23
  • 24. Classifications of MAC Protocols: …cntd  Contention-based protocols with Scheduling Mechanism: • Distributed Wireless Ordering Protocol (DWOP) • A media access scheme along with a scheduling mechanism based on the distributed priority scheduling scheme • Distributed Laxity-based Priority Scheduling (DLPS) Scheme • Scheduling decisions are made based on the states of neighboring nodes and feed back from destination nodes regarding packet losses • Packets are recorded based on their uniform laxity budgets (ULBs) and the packet delivery ratios of the flows. The laxity of a packet is the time remaining before its deadline. 24
  • 25. Classifications of MAC Protocols:  MAC Protocols that use directional Antennas:  MAC protocols that use directional antennas have several advantages: • Reduce signal interference • Increase in the system throughput • Improved channel reuse  MAC protocol using directional antennas • Make use of an RTS/CTS exchange mechanism • Use directional antennas for transmitting and receiving data packets  Directional Busy Tone-based MAC Protocol (D-BTMA) • It uses directional antennas for transmitting the RTS, CTS, data frames, and the busy tones.  Directional MAC Protocols for Ad Hoc Wireless Networks • DMAC-1: A directional antenna is used for transmitting RTS packets and Omni-directional antenna for CTS packets. • DMAC-1, both directional RTS and omni-directional RTS transmission are used. 25
  • 26. Classifications of MAC Protocols: …cntd  MAC Protocols that use directional Antennas: 26
  • 27. Classifications of MAC Protocols: …cntd  Other MAC Protocols:  Multi-channel MAC Protocol (MMAC)  Multiple channels for data transmission  There is no dedicated control channel.  Based on channel usage channels can be classified into three types: high, medium and low preference channels.  Multi-channel Carrier Sense Multiple Access(MCSMA) MAC Protocol :  The available bandwidth is divided into several channels  Power Control MAC Protocol (PCM) for Ad Hoc Networks  Allows nodes to vary their transmission power levels on a per- packet basis  Receiver-based Autorate Protocol (RBAR)  Use a rate adaptation approach  Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)  The available bandwidth is split into tow equal channels  The handshaking process is interleaved between the two channels. 27
  • 28. Note: A directional antenna or beam antenna is an antenna which radiates or receives greater power in specific directions allowing for increased performance and reduced interference from unwanted sources. Note: Omnidirectional refers to the notion(feeling) of existing in every direction. Omnidirectional antenna is that radiates equally in all directions. Note: Handshaking is the exchange of information between two modems and the resulting agreement about which protocol to use that precedes each telephone connection. 28