SlideShare a Scribd company logo
1 of 29
MAC Protocols of ADHOC 
network 
By Shashi Gurung 
Assistant Professor 
CTIEMT
MAC protocols 
• The topology is highly dynamic and frequent changes in the topology may 
be hard to predict. 
• MAC is responsible for resolving the conflicts among different nodes for 
channel access. 
• There are two problems 
– Hidden terminal problem 
– Exposed terminal problem
Hidden and Exposed Terminals 
• Hidden terminals 
– A sends to B, C cannot receive A 
– C wants to send to B, C senses a “free” medium (CS fails) 
– collision at B, A cannot receive the collision (CD fails) 
– A is “hidden” for C 
• Exposed terminals 
– B sends to A, C wants to send to another terminal (not A or B) 
– C senses carrier, finds medium in use and has to wait 
– A is outside the radio range of C, therefore waiting is not necessary 
– C is “exposed” to B 
A B C
Classifications of MAC Protocols 
• Contention-based protocols 
– Sender-initiated protocols: Packet transmissions are initiated by the sender node. 
• Single-channel sender-initiated protocols: A node that wins the contention to the 
channel can make use of the entire bandwidth. 
• Multichannel sender-initiated protocols: The available bandwidth is divided into 
multiple channels. 
– Receiver-initiated protocols: The receiver node initiates the contention resolution 
protocol. 
• Contention-based protocols with reservation mechanisms 
– Synchronous protocols: All nodes need to be synchronized. Global time 
synchronization is difficult to achieve. 
– Asynchronous protocols: These protocols use relative time information for effecting 
reservations. 
7
Classifications of MAC Protocols 
• Contention-based protocols with scheduling mechanisms 
– Node scheduling is done in a manner so that all nodes are treated fairly and 
no node is starved of bandwidth. 
– Scheduling-based schemes are also used for enforcing priorities among flows 
whose packets are queued at nodes. 
– Some scheduling schemes also consider battery characteristics. 
• Other protocols are those MAC protocols that do not strictly fall under the above 
categories.
Contention-based protocols without reservation 
Multiple Access with Collision Avoidance(MACA) 
• MACA uses signaling packets for collision avoidance 
– RTS (request to send) :sender request the right to send from a receiver 
with a short RTS packet before it sends a data packet 
– CTS (clear to send) :receiver grants the right to send as soon as it is 
ready to receive 
• Signaling packets contain 
– sender address 
– receiver address 
– packet size 
• The neighbor node that overhears an RTS packet has to defer its own 
transmission until the associated CTS packet is transmitted.
– Then any node overhearing a CTS packet would defer for the length of 
expected data transmission When a node wants to transmit a data packet, 
it first transmit a RTS (Request To Send) frame. 
• The receiver node, on receiving the RTS packet, if it is ready to receive 
the data packet, transmits a CTS (Clear to Send) packet. 
• Once the sender receives the CTS packet without any error, it starts 
transmitting the data packet. 
• If a packet transmitted by a node is lost, the node uses the binary 
exponential back-off (BEB) algorithm to back off a random interval of 
time before retrying. 
• The binary exponential back-off mechanism used in MACA might 
starves flows sometimes.
MACA examples 
• MACA avoids the problem of hidden terminals 
– A and C want to 
send to B 
– A sends RTS first 
– C waits after receiving 
CTS from B 
• MACA avoids the problem of exposed terminals 
– B wants to send to A, C 
to another terminal 
– now C does not have 
to wait for it cannot 
receive CTS from A 
11 
RTS 
CTS CTS 
A B C 
RTS 
CTS 
RTS 
A B C
• Limitations 
– MACA does not provide ACK 
– RTS-CTS approach does not always solve the hidden node problem 
– Example 
• A sends RTS to B 
• B sends CTS to A; At the same time, D sends RTS to C 
• The CTS & RTS packets collide at C 
• A transmits data to B; D resends RTS to C; C sends CTS to D 
• The data & CTS packets collide at B
MACAW 
• MACAW (MACA for Wireless) is a revision of MACA(without ACK). 
– The sender senses the carrier to see and transmits a RTS (Request To Send) 
frame if no nearby station transmits a RTS. 
– The receiver replies with a CTS (Clear To Send) frame. 
– Neighbors 
• see CTS, then keep quiet. 
• see RTS but not CTS, then keep quiet until the CTS is back to the sender. 
– The receiver sends an ACK when receiving an frame. 
• Neighbors keep silent until see ACK. 
– Collisions 
• There is no collision detection. 
• The senders know collision when they don’t receive CTS. 
• They each wait for the exponential backoff time. 13
MACAW (MACA for Wireless) 
• RTS-CTS-DS-DATA-ACK 
– RTS from A to B 
– CTS from B to A 
– Data Sending (DS) from A to B 
– Data from A to B 
– ACK from B to A 
– Random wait after any successful/unsuccessful transmission 
• Significantly higher throughput than MACA 
• Does not completely solve hidden & exposed node problems
Other Mac Protocols
PAMAS (Power aware medium access control with 
signaling) 
• RTS-CTS exchanges over a signaling channeling 
• Data transmission over a separate data channel 
• Receiver sends out a busy tone, while receiving a data packet over the signaling 
channel 
• Nodes listen to the signaling channel to determine when it is optimal to power 
down transceivers 
• A node powers itself off if it has nothing to transmit and its neighbor is 
transmitting 
• A node powers off if at least one neighbor is transmitting and another is 
receiving 
• Use of ACK and transmission of multiple packets can enhance performance

More Related Content

What's hot

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocolsPradeep Kumar TS
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networksNt Arvind
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 

What's hot (20)

MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
issues in desigining routing protocols
 issues in desigining routing protocols issues in desigining routing protocols
issues in desigining routing protocols
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Multiple access protocols in data communication networks
Multiple access protocols in data communication networksMultiple access protocols in data communication networks
Multiple access protocols in data communication networks
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 

Viewers also liked

Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Controlanishgoel
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareChih-Yu Lin
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 

Viewers also liked (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
FDDI
FDDIFDDI
FDDI
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Fddi
FddiFddi
Fddi
 
FDDI
FDDIFDDI
FDDI
 
Fddi
FddiFddi
Fddi
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 

Similar to MAC Protocols for ADHOC Networks

Similar to MAC Protocols for ADHOC Networks (20)

Adhoc
AdhocAdhoc
Adhoc
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
Mediumaccesscontrol
 
AdHocTutorial.ppt
AdHocTutorial.pptAdHocTutorial.ppt
AdHocTutorial.ppt
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 
MACPresentation.ppt
MACPresentation.pptMACPresentation.ppt
MACPresentation.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
 
Chapter 6 MAC.pdf
Chapter 6 MAC.pdfChapter 6 MAC.pdf
Chapter 6 MAC.pdf
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Mac sub layer
Mac sub layerMac sub layer
Mac sub layer
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

MAC Protocols for ADHOC Networks

  • 1. MAC Protocols of ADHOC network By Shashi Gurung Assistant Professor CTIEMT
  • 2. MAC protocols • The topology is highly dynamic and frequent changes in the topology may be hard to predict. • MAC is responsible for resolving the conflicts among different nodes for channel access. • There are two problems – Hidden terminal problem – Exposed terminal problem
  • 3. Hidden and Exposed Terminals • Hidden terminals – A sends to B, C cannot receive A – C wants to send to B, C senses a “free” medium (CS fails) – collision at B, A cannot receive the collision (CD fails) – A is “hidden” for C • Exposed terminals – B sends to A, C wants to send to another terminal (not A or B) – C senses carrier, finds medium in use and has to wait – A is outside the radio range of C, therefore waiting is not necessary – C is “exposed” to B A B C
  • 4.
  • 5.
  • 6.
  • 7. Classifications of MAC Protocols • Contention-based protocols – Sender-initiated protocols: Packet transmissions are initiated by the sender node. • Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth. • Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels. – Receiver-initiated protocols: The receiver node initiates the contention resolution protocol. • Contention-based protocols with reservation mechanisms – Synchronous protocols: All nodes need to be synchronized. Global time synchronization is difficult to achieve. – Asynchronous protocols: These protocols use relative time information for effecting reservations. 7
  • 8. Classifications of MAC Protocols • Contention-based protocols with scheduling mechanisms – Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. – Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. – Some scheduling schemes also consider battery characteristics. • Other protocols are those MAC protocols that do not strictly fall under the above categories.
  • 9. Contention-based protocols without reservation Multiple Access with Collision Avoidance(MACA) • MACA uses signaling packets for collision avoidance – RTS (request to send) :sender request the right to send from a receiver with a short RTS packet before it sends a data packet – CTS (clear to send) :receiver grants the right to send as soon as it is ready to receive • Signaling packets contain – sender address – receiver address – packet size • The neighbor node that overhears an RTS packet has to defer its own transmission until the associated CTS packet is transmitted.
  • 10. – Then any node overhearing a CTS packet would defer for the length of expected data transmission When a node wants to transmit a data packet, it first transmit a RTS (Request To Send) frame. • The receiver node, on receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS (Clear to Send) packet. • Once the sender receives the CTS packet without any error, it starts transmitting the data packet. • If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB) algorithm to back off a random interval of time before retrying. • The binary exponential back-off mechanism used in MACA might starves flows sometimes.
  • 11. MACA examples • MACA avoids the problem of hidden terminals – A and C want to send to B – A sends RTS first – C waits after receiving CTS from B • MACA avoids the problem of exposed terminals – B wants to send to A, C to another terminal – now C does not have to wait for it cannot receive CTS from A 11 RTS CTS CTS A B C RTS CTS RTS A B C
  • 12. • Limitations – MACA does not provide ACK – RTS-CTS approach does not always solve the hidden node problem – Example • A sends RTS to B • B sends CTS to A; At the same time, D sends RTS to C • The CTS & RTS packets collide at C • A transmits data to B; D resends RTS to C; C sends CTS to D • The data & CTS packets collide at B
  • 13. MACAW • MACAW (MACA for Wireless) is a revision of MACA(without ACK). – The sender senses the carrier to see and transmits a RTS (Request To Send) frame if no nearby station transmits a RTS. – The receiver replies with a CTS (Clear To Send) frame. – Neighbors • see CTS, then keep quiet. • see RTS but not CTS, then keep quiet until the CTS is back to the sender. – The receiver sends an ACK when receiving an frame. • Neighbors keep silent until see ACK. – Collisions • There is no collision detection. • The senders know collision when they don’t receive CTS. • They each wait for the exponential backoff time. 13
  • 14. MACAW (MACA for Wireless) • RTS-CTS-DS-DATA-ACK – RTS from A to B – CTS from B to A – Data Sending (DS) from A to B – Data from A to B – ACK from B to A – Random wait after any successful/unsuccessful transmission • Significantly higher throughput than MACA • Does not completely solve hidden & exposed node problems
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 29. PAMAS (Power aware medium access control with signaling) • RTS-CTS exchanges over a signaling channeling • Data transmission over a separate data channel • Receiver sends out a busy tone, while receiving a data packet over the signaling channel • Nodes listen to the signaling channel to determine when it is optimal to power down transceivers • A node powers itself off if it has nothing to transmit and its neighbor is transmitting • A node powers off if at least one neighbor is transmitting and another is receiving • Use of ACK and transmission of multiple packets can enhance performance