SlideShare a Scribd company logo
CS6003 ADHOC & SENSOR
NETWORKS
UNIT – II
Dr.A.Kathirvel, Professor and Head, Dept of CSE
Anand Institute of Higher Technology, Chennai
Unit - II
MAC PROTOCOLS FOR AD HOC WIRELESS
NETWORKS
Issues in designing a MAC Protocol- Classification of MAC
Protocols- Contention based protocols- Contention based
protocols with Reservation Mechanisms- Contention
based protocols with Scheduling Mechanisms – Multi
channel MAC-IEEE 802.11
2
3
Issues
The main issues need to be addressed while designing a
MAC protocol for ad hoc wireless networks:
Bandwidth efficiency is defined at the ratio of the
bandwidth used for actual data transmission to the total
available bandwidth. The MAC protocol for ad-hoc
networks should maximize it.
Quality of service support is essential for time-
critical applications. The MAC protocol for ad-hoc
networks should consider the constraint of ad-hoc
networks.
Synchronization can be achieved by exchange of
control packets.
4
Issues
The main issues need to be addressed while designing a MAC protocol for ad
hoc wireless networks:
Hidden and exposed terminal problems:
Hidden nodes:
Hidden stations: Carrier sensing may fail to detect another station.
For example, A and D.
Fading: The strength of radio signals diminished rapidly with the
distance from the transmitter. For example, A and C.
Exposed nodes:
Exposed stations: B is sending to A. C can detect it. C might want to
send to E but conclude it cannot transmit because C hears B.
Collision masking: The local signal might drown out the remote
transmission.
Error-Prone Shared Broadcast Channel
Distributed Nature/Lack of Central Coordination
Mobility of Nodes: Nodes are mobile most of the time.
A)THE HIDDEN STATION PROBLEM. (B) THE EXPOSED STATION PROBLEM.
Hidden & exposed terminal problem
5
6
The Hidden Terminal Problem
Wireless stations have transmission ranges
and not all stations are within radio range of
each other.
Simple CSMA will not work!
C transmits to B.
If A “senses” the channel, it will not hear
C’s transmission and falsely conclude that A
can begin a transmission to B.
7
The Exposed Station Problem
The inverse problem.
B wants to send to C and listens to the
channel.
When B hears A’s transmission, B falsely
assumes that it cannot send to C.
8
Wireless LAN configuration
LAN
Server
Wireless
LAN
Laptops
Base station/
access point
Palmtop
radio obstruction
A B C
D
E
9
Design goals of a MAC Protocol
Design goals of a MAC protocol for ad hoc wireless
networks
The operation of the protocol should be distributed.
The protocol should provide QoS support for real-
time traffic.
The access delay, which refers to the average delay
experienced by any packet to get transmitted, must be
kept low.
The available bandwidth must be utilized efficiently.
The protocol should ensure fair allocation of
bandwidth to nodes.
10
Design goals of a MAC Protocol
Control overhead must be kept as low as possible.
The protocol should minimize the effects of hidden
and exposed terminal problems.
The protocol must be scalable to large networks.
It should have power control mechanisms.
The protocol should have mechanisms for adaptive
data rate control.
It should try to use directional antennas.
The protocol should provide synchronization among
nodes.
11
Classifications of MAC protocols
Ad hoc network MAC protocols can be
classified into three types:
Contention-based protocols
Contention-based protocols with reservation
mechanisms
Contention-based protocols with scheduling
mechanisms
Other MAC protocols
12
Classifications of MAC protocols
MAC Protocols for Ad Hoc
Wireless Networks
Contention-Based
Protocols
Contention-based
protocols with
reservation mechanisms
Other MAC
Protocols
Contention-based
protocols with
scheduling mechanisms
Sender-Initiated
Protocols
Receiver-Initiated
Protocols
Synchronous
Protocols
Asynchronous
Protocols
Single-Channel
Protocols
Multichannel
Protocols
MACAW
FAMA
BTMA
DBTMA
ICSMA
RI-BTMA
MACA-BI
MARCH
D-PRMA
CATA
HRMA
RI-BTMA
MACA-BI
MARCH
SRMA/PA
FPRP
MACA/PR
RTMAC
Directional
Antennas
MMAC
MCSMA
PCM
RBAR
13
Classifications of MAC Protocols
Contention-based protocols
Sender-initiated protocols:
Packet transmissions are initiated by the sender node.
Single-channel sender-initiated protocols: A node that
wins the contention to the channel can make use of the
entire bandwidth.
Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
Receiver-initiated protocols:
The receiver node initiates the contention resolution
protocol.
14
Classifications of MAC Protocols
Contention-based protocols with reservation
mechanisms
Synchronous protocols
All nodes need to be synchronized. Global
time synchronization is difficult to achieve.
Asynchronous protocols
These protocols use relative time
information for effecting reservations.
15
Classifications of MAC Protocols
Contention-based protocols with scheduling mechanisms
Node scheduling is done in a manner so that all nodes
are treated fairly and no node is starved of bandwidth.
Scheduling-based schemes are also used for enforcing
priorities among flows whose packets are queued at
nodes.
Some scheduling schemes also consider battery
characteristics.
Other protocols are those MAC protocols that do not
strictly fall under the above categories.
16
Contention-based protocols
MACAW: A Media Access Protocol for
Wireless LANs is based on MACA (Multiple
Access Collision Avoidance) Protocol
MACA
When a node wants to transmit a data packet, it first
transmit a RTS (Request To Send) frame.
The receiver node, on receiving the RTS packet, if it
is ready to receive the data packet, transmits a CTS
(Clear to Send) packet.
17
Contention-based protocols
Once the sender receives the CTS packet
without any error, it starts transmitting the data
packet.
If a packet transmitted by a node is lost, the
node uses the binary exponential back-off
(BEB) algorithm to back off a random interval
of time before retrying.
The binary exponential back-off mechanism
used in MACA might starves flows sometimes.
The problem is solved by MACAW.
18
MACA Protocol
The MACA protocol. (a) A sending an RTS to B.
(b) B responding with a CTS to A.
19
MACA avoids the problem of hidden terminals
A and C want to send to B
A sends RTS first
C waits after receiving CTS from B
MACA examples
A B C
RTS
CTSCTS
20
MACA avoids the problem of exposed
terminals
B wants to send to A, C to another terminal
now C does not have to wait for it cannot
receive CTS from A
MACA examples
A B C
RTS
CTS
RTS
21
MACAW
Variants of this method can be found in IEEE 802.11
as DFWMAC (Distributed Foundation Wireless
MAC),
MACAW (MACA for Wireless) is a revision of
MACA.
The sender senses the carrier to see and transmits a
RTS (Request To Send) frame if no nearby station
transmits a RTS.
The receiver replies with a CTS (Clear To Send)
frame.
22
MACAW
Neighbors
see CTS, then keep quiet.
see RTS but not CTS, then keep quiet until the CTS is back
to the sender.
The receiver sends an ACK when receiving an
frame.
Neighbors keep silent until see ACK.
Collisions
There is no collision detection.
The senders know collision when they don’t receive CTS.
They each wait for the exponential backoff time.
23
MACA variant:DFWMAC in 802.11
idle
wait for the
right to send
wait for ACK
sender receiver
packet ready to send; RTS
time-out;
RTS
CTS; data
ACK
RxBusy
idle
wait for
data
RTS; RxBusy
RTS;
CTS
data;
ACK
time-out 
data;
NAK
ACK: positive acknowledgement
NAK: negative acknowledgement
RxBusy: receiver busy
time-out 
NAK;
RTS
24
Contention-based protocols
Floor acquisition Multiple Access Protocols
(FAMA)
Based on a channel access discipline which consists
of a carrier-sensing operation and a collision-
avoidance dialog between the sender and the intended
receiver of a packet.
Floor acquisition refers to the process of gaining
control of the channel.
At any time only one node is assigned to use the
channel.
25
Contention-based protocols
Carrier-sensing by the sender, followed by the RTS-
CTS control packet exchange, enables the protocol to
perform as efficiently as MACA.
Two variations of FAMA
RTS-CTS exchange with no carrier-sensing uses the
ALOHA protocol for transmitting RTS packets.
RTS-CTS exchange with non-persistent carrier-
sensing uses non-persistent CSMA for the same
purpose.
26
Contention-based protocols
Busy Tone Multiple Access Protocols (BTMA)
The transmission channel is split into two:
a data channel for data packet transmissions
a control channel used to transmit the busy tone signal
When a node is ready for transmission, it senses the channel to
check whether the busy tone is active.
If not, it turns on the busy tone signal and starts data
transmissions
Otherwise, it reschedules the packet for transmission after
some random rescheduling delay.
Any other node which senses the carrier on the incoming
data channel also transmits the busy tone signal on the
control channel, thus, prevent two neighboring nodes from
transmitting at the same time.
27
Contention-based protocols
Dual Busy Tone Multiple Access Protocol
(DBTMAP) is an extension of the BTMA
scheme.
a data channel for data packet transmissions
a control channel used for control packet
transmissions (RTS and CTS packets) and also
for transmitting the busy tones.
28
Contention-based protocols
Receiver-Initiated Busy Tone Multiple Access Protocol
(RI-BTMA)
The transmission channel is split into two:
a data channel for data packet transmissions
a control channel used for transmitting the busy
tone signal
A node can transmit on the data channel only if it
finds the busy tone to be absent on the control
channel.
The data packet is divided into two portions: a
preamble and the actual data packet.
29
Contention-based protocols
MACA-By Invitation (MACA-BI) is a receiver-
initiated MAC protocol.
By eliminating the need for the RTS packet it
reduces the number of control packets used in
the MACA protocol which uses the three-way
handshake mechanism.
Media Access with Reduced Handshake
(MARCH) is a receiver-initiated protocol.
30
Contention-based Protocols with
Reservation Mechanisms
Contention-based Protocols with Reservation
Mechanisms
Contention occurs during the resource (bandwidth)
reservation phase.
Once the bandwidth is reserved, the node gets
exclusive access to the reserved bandwidth.
QoS support can be provided for real-time traffic.
31
Contention-based Protocols with
Reservation Mechanisms
Distributed packet reservation multiple access protocol
(D-PRMA)
It extends the centralized packet reservation multiple
access (PRMA) scheme into a distributed scheme that
can be used in ad hoc wireless networks.
PRMA was designed in a wireless LAN with a base
station.
D-PRMA extends PRMA protocol in a wireless
LAN.
D-PRMA is a TDMA-based scheme. The channel is
divided into fixed- and equal-sized frames along the
time axis.
32
Access method DAMA: Reservation-
TDMA
 Reservation Time Division Multiple Access
every frame consists of N mini-slots and x data-slots
every station has its own mini-slot and can reserve up to k
data-slots using this mini-slot (i.e. x = N * k).
other stations can send data in unused data-slots according to a
round-robin sending scheme (best-effort traffic)
N mini-slots N * k data-slots
reservations
for data-slots
other stations can use free data-slots
based on a round-robin scheme
e.g. N=6, k=2
33
Distributed Packet Reservation
Multiple Access Protocol (D-PRMA)
Implicit reservation (PRMA - Packet
Reservation Multiple Access)
frame1
frame2
frame3
frame4
frame5
1 2 3 4 5 6 7 8 time-slot
collision at
reservation
attempts
A C D A B A F
A C A B A
A B A F
A B A F D
A C E E B A F D
t
ACDABA-F
ACDABA-F
AC-ABAF-
A---BAFD
ACEEBAFD
reservation
33
Distributed Packet Reservation
Multiple Access Protocol (D-PRMA)
a certain number of slots form a frame, frames are
repeated
stations compete for empty slots according to the
slotted aloha principle
once a station reserves a slot successfully, this slot is
automatically assigned to this station in all following
frames as long as the station has data to send
competition for this slots starts again as soon as the
slot was empty in the last frame
34
35
Contention-based protocols
with Reservation Mechanisms
Collision avoidance time allocation protocol (CATA)
based on dynamic topology-dependent transmission
scheduling
Nodes contend for and reserve time slots by means
of a distributed reservation and handshake
mechanism.
Support broadcast, unicast, and multicast
transmissions.
36
Contention-based protocols
with Reservation Mechanisms
The operation is based on two basic principles:
The receiver(s) of a flow must inform the potential source
nodes about the reserved slot on which it is currently
receiving packets. The source node must inform the
potential destination node(s) about interferences in the
slot.
Usage of negative acknowledgements for reservation
requests, and control packet transmissions at the beginning
of each slot, for distributing slot reservation information to
senders of broadcast or multicast sessions.
37
Contention-based protocols
with Reservation Mechanisms
Hop reservation multiple access protocol (HRMA)
a multichannel MAC protocol which is based on
half-duplex, very slow frequency-hopping spread
spectrum (FHSS) radios
uses a reservation and handshake mechanism to
enable a pair of communicating nodes to reserve a
frequency hop, thereby guaranteeing collision-free
data transmission.
can be viewed as a time slot reservation protocol
where each time slot is assigned a separate frequency
channel.
38
Contention-based protocols
with Reservation Mechanisms
Soft reservation multiple access with priority
assignment (SRMA/PA)
Developed with the main objective of
supporting integrated services of real-time and
non-real-time application in ad hoc networks,
at the same time maximizing the statistical
multiplexing gain.
Nodes use a collision-avoidance handshake
mechanism and a soft reservation mechanism.
39
Five-Phase Reservation Protocol (FPRP)
a single-channel time division multiple access
(TDMA)-based broadcast scheduling protocol.
Nodes uses a contention mechanism in order to
acquire time slots.
The protocol assumes the availability of global time
at all nodes.
The reservation takes five phases: reservation,
collision report, reservation confirmation, reservation
acknowledgement, and packing and elimination
phase.
Contention-based protocols
with Reservation Mechanisms
40
MACA with Piggy-Backed Reservation (MACA/PR)
Provide real-time traffic support in multi-hop
wireless networks
Based on the MACAW protocol with non-persistent
CSMA
The main components of MACA/PR are:
A MAC protocol
A reservation protocol
A QoS routing protocol
Contention-based protocols
with Reservation Mechanisms
41
Real-Time Medium Access Control Protocol (RTMAC)
Provides a bandwidth reservation mechanism for
supporting real-time traffic in ad hoc wireless networks
RTMAC has two components
A MAC layer protocol is a real-time extension of the
IEEE 802.11 DCF.
A medium-access protocol for best-effort traffic
A reservation protocol for real-time traffic
A QoS routing protocol is responsible for end-to-end
reservation and release of bandwidth resources.
Contention-based protocols
with Reservation Mechanisms
42
Protocols in this category focus on packet
scheduling at the nodes and transmission
scheduling of the nodes.
The factors that affects scheduling decisions
Delay targets of packets
Traffic load at nodes
Battery power
Contention-based protocols
with Scheduling Mechanisms
43
Distributed priority scheduling and medium
access in Ad Hoc Networks present two
mechanisms for providing quality of service
(QoS)
Distributed priority scheduling (DPS) – piggy-backs
the priority tag of a node’s current and head-of-line
packets o the control and data packets
Multi-hop coordination – extends the DPS scheme to
carry out scheduling over multi-hop paths.
Contention-based protocols
with Scheduling Mechanisms
44
Distributed Wireless Ordering Protocol (DWOP)
A media access scheme along with a scheduling
mechanism
Based on the distributed priority scheduling scheme
Contention-based protocols
with Scheduling Mechanisms
45
Distributed Laxity-based Priority Scheduling (DLPS)
Scheme
Scheduling decisions are made based on
The states of neighboring nodes and feed back from
destination nodes regarding packet losses
Packets are recorded based on their uniform laxity
budgets (ULBs) and the packet delivery ratios of the
flows. The laxity of a packet is the time remaining
before its deadline.
Contention-based protocols
with Scheduling Mechanisms
46
MAC protocols that use directional antennas have
several advantages:
Reduce signal interference
Increase in the system throughput
Improved channel reuse
MAC protocol using directional antennas
Make use of an RTS/CTS exchange mechanism
Use directional antennas for transmitting and
receiving data packets
MAC Protocols that use directional
Antennas
47
Directional Busy Tone-based MAC Protocol (DBTMA)
It uses directional antennas for transmitting the RTS,
CTS, data frames, and the busy tones.
Directional MAC Protocols for Ad Hoc Wireless
Networks
DMAC-1, a directional antenna is used for
transmitting RTS packets and omni-directional antenna
for CTS packets.
DMAC-1, both directional RTS and omni-directional
RTS transmission are used.
MAC Protocols that use directional
Antennas
48
Other MAC Protocols
Multi-channel MAC Protocol (MMAC)
Multiple channels for data transmission
There is no dedicated control channel.
Based on channel usage channels can be classified into three types: high
preference channel (HIGH), medium preference channel (MID), low
preference channel (LOW)
Multi-channel CSMA MAC Protocol (MCSMA)
The available bandwidth is divided into several channels
Power Control MAC Protocol (PCM) for Ad Hoc Networks
Allows nodes to vary their transmission power levels on a per-packet basis
Receiver-based Autorate Protocol (RBAR)
Use a rate adaptation approach
Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
The available bandwidth is split into tow equal channels
The handshaking process is interleaved between the two channels.
What is IEEE 802.11?
Standard for wireless local area networks (wireless
LANs) developed in 1990 by IEEE
Intended for home or office use (primarily indoor)
802.11 standard describes the MAC layer, while
other substandards (802.11a, 802.11b) describe the
physical layer
Wireless version of the Ethernet (802.3) standard
49
Network Setup
Ethernet
MT
AP AP AP
MT MT
Basic Network Setup is Cellular
Mobile Terminals (MT) connect with Access Points (AP)
Standard also supports ad-hoc networking where MT’s talk directly to MT’s
50
IEEE 802.11 Physical Layers
802.11b 802.11a
Modulation Scheme DSSS OFDM
Spectrum (GHz) 2.4 – 2.485 5.15-5.35, 5.725-5.825
Data Rate (Mbps) 1 – 11 6 - 54
Subchannels 11 overlapping 8 independent
Interference Microwave, Cordless
Phones,Bluetooth,
HomeRF, Light Bulbs!
HyperLAN II
Availability Today Late August?
Cost $250 AP, $100 PC Card ??? (same)
51
Media Access Control - Ethernet
 CSMA/CD (Carrier Sense Multiple Access with Collision
Detection)
If media is sensed idle, transmit
If media is sensed busy, wait until idle and then transmit
immediately
 Collisions can occur if more than one user transmits at the same
time
If a collision is detected, stop transmitting.
Reschedule transmission according to exponential backoff
Desktop System Desktop System Desktop System
Ethernet
52
Media Access Control (802.11)
Would like to use CSMA
Nice for bursty traffic
Make for seamless replacement of wired LANs with
wireless LANS
Use CSMA, but can’t use CD
PT/PR ratio is too high
Don’t want to waste energy on mobiles
Use Collision Avoidance instead
Don’t always start transmitting immediately after
someone else
53
CSMA/CA Details
SIFS (Short Interframe Space)
DIFS (Distributed Interframe Space)
Packet A ACK
B C
SIFS DIFS
Packet C ACK
SIFS DIFS
Packet B
Scenario:
B and C want to transmit, but A currently has control of medium
B randomly selects 7 slots of backoff, C selects 4 slots
C transmits first, then B
54
What is HIPERLAN/2?
European standard developed by ETSI/BRAN
(European Telecommunications Standards
Institute/Broadband Radio Access Networks)
Physical Layer is very similar to 802.11a
(OFDM operating in the 5 GHz spectrum)
Standard based on wireless ATM
(Asynchronous Transfer Mode)
55
HIPERLAN/2 MAC
BCH – Miscellaneous header
FCH – Details how the DL and UL phases will be allocated
ACH – Feedback on which resource requests were received
RCH – Random access resource request
56
Performance Comparison
57
IEEE 802.11
IEEE 802.11 is a widely accepted standard in the United
States for wireless LANs
Primarily a “cellular” random access scheme with
provisions for ad hoc networking and contention free
access
802.11b products are available now, but better to wait
for 802.11a products later this year
HIPERLAN/2 is being pushed in Europe
Wireless ATM solution for real-time traffic
Standard reflects the network topology
58
Questions ?

More Related Content

What's hot

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
AKSHIT KOHLI
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
ajitece
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Pradeep Kumar TS
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 

What's hot (20)

Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Cdma ppt for ECE
Cdma ppt for ECECdma ppt for ECE
Cdma ppt for ECE
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 

Viewers also liked

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
Nimii Nimo
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
Ali Habeeb
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
Kathirvel Ayyaswamy
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
Mahesh Kumar Chelimilla
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
Kathirvel Ayyaswamy
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
Kathirvel Ayyaswamy
 

Viewers also liked (20)

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 

Similar to CS6003 ADHOC & SENSOR NETWORKS

14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
nanisaketh
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
syam babu
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
MahendraMunirathnam1
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
Wendy Hager
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
Mridula Sharma
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Akansha Verma
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
mmjalbiaty
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
HirazNor
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
IOSR Journals
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
msohail37
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
Iffat Anjum
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
swayambhoo
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
nooralleema
 
CAN BUS.ppt
CAN BUS.pptCAN BUS.ppt

Similar to CS6003 ADHOC & SENSOR NETWORKS (20)

14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
Lect04
Lect04Lect04
Lect04
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Mac
MacMac
Mac
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Chapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptxChapter_05_WLAN_MAC-Performance metrics.pptx
Chapter_05_WLAN_MAC-Performance metrics.pptx
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
CAN BUS.ppt
CAN BUS.pptCAN BUS.ppt
CAN BUS.ppt
 

More from Kathirvel Ayyaswamy

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
Kathirvel Ayyaswamy
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
Kathirvel Ayyaswamy
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
Kathirvel Ayyaswamy
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
Kathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
Kathirvel Ayyaswamy
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
Kathirvel Ayyaswamy
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
Kathirvel Ayyaswamy
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
Kathirvel Ayyaswamy
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
Kathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
Kathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 

Recently uploaded (20)

Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 

CS6003 ADHOC & SENSOR NETWORKS

  • 1. CS6003 ADHOC & SENSOR NETWORKS UNIT – II Dr.A.Kathirvel, Professor and Head, Dept of CSE Anand Institute of Higher Technology, Chennai
  • 2. Unit - II MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11 2
  • 3. 3 Issues The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks: Bandwidth efficiency is defined at the ratio of the bandwidth used for actual data transmission to the total available bandwidth. The MAC protocol for ad-hoc networks should maximize it. Quality of service support is essential for time- critical applications. The MAC protocol for ad-hoc networks should consider the constraint of ad-hoc networks. Synchronization can be achieved by exchange of control packets.
  • 4. 4 Issues The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks: Hidden and exposed terminal problems: Hidden nodes: Hidden stations: Carrier sensing may fail to detect another station. For example, A and D. Fading: The strength of radio signals diminished rapidly with the distance from the transmitter. For example, A and C. Exposed nodes: Exposed stations: B is sending to A. C can detect it. C might want to send to E but conclude it cannot transmit because C hears B. Collision masking: The local signal might drown out the remote transmission. Error-Prone Shared Broadcast Channel Distributed Nature/Lack of Central Coordination Mobility of Nodes: Nodes are mobile most of the time.
  • 5. A)THE HIDDEN STATION PROBLEM. (B) THE EXPOSED STATION PROBLEM. Hidden & exposed terminal problem 5
  • 6. 6 The Hidden Terminal Problem Wireless stations have transmission ranges and not all stations are within radio range of each other. Simple CSMA will not work! C transmits to B. If A “senses” the channel, it will not hear C’s transmission and falsely conclude that A can begin a transmission to B.
  • 7. 7 The Exposed Station Problem The inverse problem. B wants to send to C and listens to the channel. When B hears A’s transmission, B falsely assumes that it cannot send to C.
  • 8. 8 Wireless LAN configuration LAN Server Wireless LAN Laptops Base station/ access point Palmtop radio obstruction A B C D E
  • 9. 9 Design goals of a MAC Protocol Design goals of a MAC protocol for ad hoc wireless networks The operation of the protocol should be distributed. The protocol should provide QoS support for real- time traffic. The access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low. The available bandwidth must be utilized efficiently. The protocol should ensure fair allocation of bandwidth to nodes.
  • 10. 10 Design goals of a MAC Protocol Control overhead must be kept as low as possible. The protocol should minimize the effects of hidden and exposed terminal problems. The protocol must be scalable to large networks. It should have power control mechanisms. The protocol should have mechanisms for adaptive data rate control. It should try to use directional antennas. The protocol should provide synchronization among nodes.
  • 11. 11 Classifications of MAC protocols Ad hoc network MAC protocols can be classified into three types: Contention-based protocols Contention-based protocols with reservation mechanisms Contention-based protocols with scheduling mechanisms Other MAC protocols
  • 12. 12 Classifications of MAC protocols MAC Protocols for Ad Hoc Wireless Networks Contention-Based Protocols Contention-based protocols with reservation mechanisms Other MAC Protocols Contention-based protocols with scheduling mechanisms Sender-Initiated Protocols Receiver-Initiated Protocols Synchronous Protocols Asynchronous Protocols Single-Channel Protocols Multichannel Protocols MACAW FAMA BTMA DBTMA ICSMA RI-BTMA MACA-BI MARCH D-PRMA CATA HRMA RI-BTMA MACA-BI MARCH SRMA/PA FPRP MACA/PR RTMAC Directional Antennas MMAC MCSMA PCM RBAR
  • 13. 13 Classifications of MAC Protocols Contention-based protocols Sender-initiated protocols: Packet transmissions are initiated by the sender node. Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth. Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels. Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.
  • 14. 14 Classifications of MAC Protocols Contention-based protocols with reservation mechanisms Synchronous protocols All nodes need to be synchronized. Global time synchronization is difficult to achieve. Asynchronous protocols These protocols use relative time information for effecting reservations.
  • 15. 15 Classifications of MAC Protocols Contention-based protocols with scheduling mechanisms Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. Some scheduling schemes also consider battery characteristics. Other protocols are those MAC protocols that do not strictly fall under the above categories.
  • 16. 16 Contention-based protocols MACAW: A Media Access Protocol for Wireless LANs is based on MACA (Multiple Access Collision Avoidance) Protocol MACA When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame. The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS (Clear to Send) packet.
  • 17. 17 Contention-based protocols Once the sender receives the CTS packet without any error, it starts transmitting the data packet. If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB) algorithm to back off a random interval of time before retrying. The binary exponential back-off mechanism used in MACA might starves flows sometimes. The problem is solved by MACAW.
  • 18. 18 MACA Protocol The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.
  • 19. 19 MACA avoids the problem of hidden terminals A and C want to send to B A sends RTS first C waits after receiving CTS from B MACA examples A B C RTS CTSCTS
  • 20. 20 MACA avoids the problem of exposed terminals B wants to send to A, C to another terminal now C does not have to wait for it cannot receive CTS from A MACA examples A B C RTS CTS RTS
  • 21. 21 MACAW Variants of this method can be found in IEEE 802.11 as DFWMAC (Distributed Foundation Wireless MAC), MACAW (MACA for Wireless) is a revision of MACA. The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. The receiver replies with a CTS (Clear To Send) frame.
  • 22. 22 MACAW Neighbors see CTS, then keep quiet. see RTS but not CTS, then keep quiet until the CTS is back to the sender. The receiver sends an ACK when receiving an frame. Neighbors keep silent until see ACK. Collisions There is no collision detection. The senders know collision when they don’t receive CTS. They each wait for the exponential backoff time.
  • 23. 23 MACA variant:DFWMAC in 802.11 idle wait for the right to send wait for ACK sender receiver packet ready to send; RTS time-out; RTS CTS; data ACK RxBusy idle wait for data RTS; RxBusy RTS; CTS data; ACK time-out  data; NAK ACK: positive acknowledgement NAK: negative acknowledgement RxBusy: receiver busy time-out  NAK; RTS
  • 24. 24 Contention-based protocols Floor acquisition Multiple Access Protocols (FAMA) Based on a channel access discipline which consists of a carrier-sensing operation and a collision- avoidance dialog between the sender and the intended receiver of a packet. Floor acquisition refers to the process of gaining control of the channel. At any time only one node is assigned to use the channel.
  • 25. 25 Contention-based protocols Carrier-sensing by the sender, followed by the RTS- CTS control packet exchange, enables the protocol to perform as efficiently as MACA. Two variations of FAMA RTS-CTS exchange with no carrier-sensing uses the ALOHA protocol for transmitting RTS packets. RTS-CTS exchange with non-persistent carrier- sensing uses non-persistent CSMA for the same purpose.
  • 26. 26 Contention-based protocols Busy Tone Multiple Access Protocols (BTMA) The transmission channel is split into two: a data channel for data packet transmissions a control channel used to transmit the busy tone signal When a node is ready for transmission, it senses the channel to check whether the busy tone is active. If not, it turns on the busy tone signal and starts data transmissions Otherwise, it reschedules the packet for transmission after some random rescheduling delay. Any other node which senses the carrier on the incoming data channel also transmits the busy tone signal on the control channel, thus, prevent two neighboring nodes from transmitting at the same time.
  • 27. 27 Contention-based protocols Dual Busy Tone Multiple Access Protocol (DBTMAP) is an extension of the BTMA scheme. a data channel for data packet transmissions a control channel used for control packet transmissions (RTS and CTS packets) and also for transmitting the busy tones.
  • 28. 28 Contention-based protocols Receiver-Initiated Busy Tone Multiple Access Protocol (RI-BTMA) The transmission channel is split into two: a data channel for data packet transmissions a control channel used for transmitting the busy tone signal A node can transmit on the data channel only if it finds the busy tone to be absent on the control channel. The data packet is divided into two portions: a preamble and the actual data packet.
  • 29. 29 Contention-based protocols MACA-By Invitation (MACA-BI) is a receiver- initiated MAC protocol. By eliminating the need for the RTS packet it reduces the number of control packets used in the MACA protocol which uses the three-way handshake mechanism. Media Access with Reduced Handshake (MARCH) is a receiver-initiated protocol.
  • 30. 30 Contention-based Protocols with Reservation Mechanisms Contention-based Protocols with Reservation Mechanisms Contention occurs during the resource (bandwidth) reservation phase. Once the bandwidth is reserved, the node gets exclusive access to the reserved bandwidth. QoS support can be provided for real-time traffic.
  • 31. 31 Contention-based Protocols with Reservation Mechanisms Distributed packet reservation multiple access protocol (D-PRMA) It extends the centralized packet reservation multiple access (PRMA) scheme into a distributed scheme that can be used in ad hoc wireless networks. PRMA was designed in a wireless LAN with a base station. D-PRMA extends PRMA protocol in a wireless LAN. D-PRMA is a TDMA-based scheme. The channel is divided into fixed- and equal-sized frames along the time axis.
  • 32. 32 Access method DAMA: Reservation- TDMA  Reservation Time Division Multiple Access every frame consists of N mini-slots and x data-slots every station has its own mini-slot and can reserve up to k data-slots using this mini-slot (i.e. x = N * k). other stations can send data in unused data-slots according to a round-robin sending scheme (best-effort traffic) N mini-slots N * k data-slots reservations for data-slots other stations can use free data-slots based on a round-robin scheme e.g. N=6, k=2
  • 33. 33 Distributed Packet Reservation Multiple Access Protocol (D-PRMA) Implicit reservation (PRMA - Packet Reservation Multiple Access) frame1 frame2 frame3 frame4 frame5 1 2 3 4 5 6 7 8 time-slot collision at reservation attempts A C D A B A F A C A B A A B A F A B A F D A C E E B A F D t ACDABA-F ACDABA-F AC-ABAF- A---BAFD ACEEBAFD reservation 33
  • 34. Distributed Packet Reservation Multiple Access Protocol (D-PRMA) a certain number of slots form a frame, frames are repeated stations compete for empty slots according to the slotted aloha principle once a station reserves a slot successfully, this slot is automatically assigned to this station in all following frames as long as the station has data to send competition for this slots starts again as soon as the slot was empty in the last frame 34
  • 35. 35 Contention-based protocols with Reservation Mechanisms Collision avoidance time allocation protocol (CATA) based on dynamic topology-dependent transmission scheduling Nodes contend for and reserve time slots by means of a distributed reservation and handshake mechanism. Support broadcast, unicast, and multicast transmissions.
  • 36. 36 Contention-based protocols with Reservation Mechanisms The operation is based on two basic principles: The receiver(s) of a flow must inform the potential source nodes about the reserved slot on which it is currently receiving packets. The source node must inform the potential destination node(s) about interferences in the slot. Usage of negative acknowledgements for reservation requests, and control packet transmissions at the beginning of each slot, for distributing slot reservation information to senders of broadcast or multicast sessions.
  • 37. 37 Contention-based protocols with Reservation Mechanisms Hop reservation multiple access protocol (HRMA) a multichannel MAC protocol which is based on half-duplex, very slow frequency-hopping spread spectrum (FHSS) radios uses a reservation and handshake mechanism to enable a pair of communicating nodes to reserve a frequency hop, thereby guaranteeing collision-free data transmission. can be viewed as a time slot reservation protocol where each time slot is assigned a separate frequency channel.
  • 38. 38 Contention-based protocols with Reservation Mechanisms Soft reservation multiple access with priority assignment (SRMA/PA) Developed with the main objective of supporting integrated services of real-time and non-real-time application in ad hoc networks, at the same time maximizing the statistical multiplexing gain. Nodes use a collision-avoidance handshake mechanism and a soft reservation mechanism.
  • 39. 39 Five-Phase Reservation Protocol (FPRP) a single-channel time division multiple access (TDMA)-based broadcast scheduling protocol. Nodes uses a contention mechanism in order to acquire time slots. The protocol assumes the availability of global time at all nodes. The reservation takes five phases: reservation, collision report, reservation confirmation, reservation acknowledgement, and packing and elimination phase. Contention-based protocols with Reservation Mechanisms
  • 40. 40 MACA with Piggy-Backed Reservation (MACA/PR) Provide real-time traffic support in multi-hop wireless networks Based on the MACAW protocol with non-persistent CSMA The main components of MACA/PR are: A MAC protocol A reservation protocol A QoS routing protocol Contention-based protocols with Reservation Mechanisms
  • 41. 41 Real-Time Medium Access Control Protocol (RTMAC) Provides a bandwidth reservation mechanism for supporting real-time traffic in ad hoc wireless networks RTMAC has two components A MAC layer protocol is a real-time extension of the IEEE 802.11 DCF. A medium-access protocol for best-effort traffic A reservation protocol for real-time traffic A QoS routing protocol is responsible for end-to-end reservation and release of bandwidth resources. Contention-based protocols with Reservation Mechanisms
  • 42. 42 Protocols in this category focus on packet scheduling at the nodes and transmission scheduling of the nodes. The factors that affects scheduling decisions Delay targets of packets Traffic load at nodes Battery power Contention-based protocols with Scheduling Mechanisms
  • 43. 43 Distributed priority scheduling and medium access in Ad Hoc Networks present two mechanisms for providing quality of service (QoS) Distributed priority scheduling (DPS) – piggy-backs the priority tag of a node’s current and head-of-line packets o the control and data packets Multi-hop coordination – extends the DPS scheme to carry out scheduling over multi-hop paths. Contention-based protocols with Scheduling Mechanisms
  • 44. 44 Distributed Wireless Ordering Protocol (DWOP) A media access scheme along with a scheduling mechanism Based on the distributed priority scheduling scheme Contention-based protocols with Scheduling Mechanisms
  • 45. 45 Distributed Laxity-based Priority Scheduling (DLPS) Scheme Scheduling decisions are made based on The states of neighboring nodes and feed back from destination nodes regarding packet losses Packets are recorded based on their uniform laxity budgets (ULBs) and the packet delivery ratios of the flows. The laxity of a packet is the time remaining before its deadline. Contention-based protocols with Scheduling Mechanisms
  • 46. 46 MAC protocols that use directional antennas have several advantages: Reduce signal interference Increase in the system throughput Improved channel reuse MAC protocol using directional antennas Make use of an RTS/CTS exchange mechanism Use directional antennas for transmitting and receiving data packets MAC Protocols that use directional Antennas
  • 47. 47 Directional Busy Tone-based MAC Protocol (DBTMA) It uses directional antennas for transmitting the RTS, CTS, data frames, and the busy tones. Directional MAC Protocols for Ad Hoc Wireless Networks DMAC-1, a directional antenna is used for transmitting RTS packets and omni-directional antenna for CTS packets. DMAC-1, both directional RTS and omni-directional RTS transmission are used. MAC Protocols that use directional Antennas
  • 48. 48 Other MAC Protocols Multi-channel MAC Protocol (MMAC) Multiple channels for data transmission There is no dedicated control channel. Based on channel usage channels can be classified into three types: high preference channel (HIGH), medium preference channel (MID), low preference channel (LOW) Multi-channel CSMA MAC Protocol (MCSMA) The available bandwidth is divided into several channels Power Control MAC Protocol (PCM) for Ad Hoc Networks Allows nodes to vary their transmission power levels on a per-packet basis Receiver-based Autorate Protocol (RBAR) Use a rate adaptation approach Interleaved Carrier-Sense Multiple Access Protocol (ICSMA) The available bandwidth is split into tow equal channels The handshaking process is interleaved between the two channels.
  • 49. What is IEEE 802.11? Standard for wireless local area networks (wireless LANs) developed in 1990 by IEEE Intended for home or office use (primarily indoor) 802.11 standard describes the MAC layer, while other substandards (802.11a, 802.11b) describe the physical layer Wireless version of the Ethernet (802.3) standard 49
  • 50. Network Setup Ethernet MT AP AP AP MT MT Basic Network Setup is Cellular Mobile Terminals (MT) connect with Access Points (AP) Standard also supports ad-hoc networking where MT’s talk directly to MT’s 50
  • 51. IEEE 802.11 Physical Layers 802.11b 802.11a Modulation Scheme DSSS OFDM Spectrum (GHz) 2.4 – 2.485 5.15-5.35, 5.725-5.825 Data Rate (Mbps) 1 – 11 6 - 54 Subchannels 11 overlapping 8 independent Interference Microwave, Cordless Phones,Bluetooth, HomeRF, Light Bulbs! HyperLAN II Availability Today Late August? Cost $250 AP, $100 PC Card ??? (same) 51
  • 52. Media Access Control - Ethernet  CSMA/CD (Carrier Sense Multiple Access with Collision Detection) If media is sensed idle, transmit If media is sensed busy, wait until idle and then transmit immediately  Collisions can occur if more than one user transmits at the same time If a collision is detected, stop transmitting. Reschedule transmission according to exponential backoff Desktop System Desktop System Desktop System Ethernet 52
  • 53. Media Access Control (802.11) Would like to use CSMA Nice for bursty traffic Make for seamless replacement of wired LANs with wireless LANS Use CSMA, but can’t use CD PT/PR ratio is too high Don’t want to waste energy on mobiles Use Collision Avoidance instead Don’t always start transmitting immediately after someone else 53
  • 54. CSMA/CA Details SIFS (Short Interframe Space) DIFS (Distributed Interframe Space) Packet A ACK B C SIFS DIFS Packet C ACK SIFS DIFS Packet B Scenario: B and C want to transmit, but A currently has control of medium B randomly selects 7 slots of backoff, C selects 4 slots C transmits first, then B 54
  • 55. What is HIPERLAN/2? European standard developed by ETSI/BRAN (European Telecommunications Standards Institute/Broadband Radio Access Networks) Physical Layer is very similar to 802.11a (OFDM operating in the 5 GHz spectrum) Standard based on wireless ATM (Asynchronous Transfer Mode) 55
  • 56. HIPERLAN/2 MAC BCH – Miscellaneous header FCH – Details how the DL and UL phases will be allocated ACH – Feedback on which resource requests were received RCH – Random access resource request 56
  • 58. IEEE 802.11 IEEE 802.11 is a widely accepted standard in the United States for wireless LANs Primarily a “cellular” random access scheme with provisions for ad hoc networking and contention free access 802.11b products are available now, but better to wait for 802.11a products later this year HIPERLAN/2 is being pushed in Europe Wireless ATM solution for real-time traffic Standard reflects the network topology 58