SlideShare a Scribd company logo
1 of 38
Ad-Hoc Network Architecture and
protocols of Medium Access
Control (MAC) Layer
Under the Supervision of Dr. M. P. Singh
Akansha Verma
M.Tech, 2nd Year
Reg. no: 1328014
Computer Science & Engineering
Outline
 Introduction
 Key properties
 Applications
 Important Issues
 Mac Layer in Ad-Hoc networks
 Need for Special MAC protocols
 Classification
 QoS
 Conclusion
What are ad Hoc Networks?
 A wireless network which does not
have a infrastructure and is self
adaptive and organizing is known as
ad Hoc network.
 In these network any device can
associate with another device within
its link range.
Characteristics
 Don’t have any infrastructure.
 Spontaneously Deployable.
 Dynamic.
 Multihop Based.
 Adaptable.
 Usually Mobile.
Technical Aspects
 Consists of Multiple nodes and Links.
 Links are influenced by nodes
behavior and link properties.
 As this network is dynamic it should
cope up with issues like restructuring
of links.
 Routing.
Applications
 In case of natural disaster.
 Military applications.
 Mobile Computing etc.
 Industrial and Scientific Applications.
Important Issues
 Limited Bandwidth
-Wireless Media in tightly controlled and has
limitations.
 Error Prone
- Factors like Multiple access, Signal fading,
Additional Noise and interference cause errors .
 Frequent change in Topology
- Dynamic Nature of network and Mobility cause
unpredictable changes.
Continued.
 Routing
- Earlier protocols require a static network for
finding optimal routes but here network in dynamic.
 Security
-The information transferred should be secure.
 Energy Conservation
- Sometimes the node may have limited battery
supply.
Mac Layer in Ad-Hoc networks
 Responsibilities of a MAC layer in any
networks are a vast some of which include:
- Error Correction.
- Framing, Physical Addressing, Flow
Control, Error Control.
- Control of conflicts between nodes for
medium accessing.
- Efficiency and reliability.
Need for Special MAC
Protocols
 The usual CSMA and its variants
cannot be used.
 Because of fading of signal in wireless
media which remain undetected at
receiver.
 Hidden terminal problem
 Exposed terminal problem
Classification
 Mac Schemes can be classified
basically in Contention free and
contention based.
 Contention free scheme used
predefined assignments (ex time in
TDMA) which is good for static
networks.
 Contention Based are preferred for
Ad-Hoc networks.
Continued.
Continued.
 Classification of MAC protocols can be
done on different grounds like :
- Sender initiated or Receiver initiated.
- Power aware.
- Single channel or multiple channel.
- Quality of Service aware or not.
 The further classification is done on
these major points.
General MAC protocols
 These are the basic MAC protocols
from which various other protocols are
derived.
 Some of the examples includes
MACA, MACAW, FAMA etc.
Multiple access collision
avoidance (MACA)
 Introduced to solved hidden and
exposed terminal problems.
 Uses RTS-CTS mechanism for data
transfer.
 Key idea is that any neighboring node
that hear the RTS or CTS defers its
transmission.
 Its effective because RTS and CTS
are significantly smaller then the data
packet so their collision causes less
Continued
 Not always solves the hidden terminal
problem.
 Lack of acknowledge of data packet.
 Various other variants of MACA were
later introduced like: MACAW, MACA-
BI, FAMA etc.
Power Aware MAC protocols
 It is crucial to conserve the energy of
mobile nodes as they are battery
powered.
 Collision is the main cause of power
loss.
 Transceivers should be kept in
standby mode when no transmission
is occurring Ex: PAMAS .
 An optimum power for transmission
should be used instead of full
transmission power Ex: PCM.
Power aware MAC signalling
(PAMAS)
 Uses separate channels for data and
control packets.
 While receiving a data on data
channel it sends busy tone on signal
channel.
 Each node decides on its own when to
sleep based on activity of its
neighboring nodes.
 Usually switches off when it has
nothing to transmit or neighbor is
Power control medium access
control (PCM)
 Unlike the other approaches which
alternates between sleep and wake
state, it sends RTS and CTS with
maximum power.
 Whereas data is sent with minimum
power.
 Method of determining the power
levels is explained further.
Continued
Continued.
 Node D sends the RTS to node E at a
transmit power level Pmax, and also
includes this value in the packet.
 E measures the actual signal strength,
say Pr, of the received RTS packet.
 Based on Pmax, Pr and the noise level at
its location, E then computes the
minimum necessary power level (say,
Psuff) that would actually be sufficient for
use by D.
 Now, when E responds with the CTS
packet using the maximum power it has
available, it includes the value of Psuff
that D subsequently uses for data
Drawbacks
 Accurate estimation of signal strength
required.
 dynamics of wireless signal
propagation due to fading and
shadowing effect may degrade its
performance.
 Difficulty in implementing frequent
changes in the transmit power levels.
Multiple channel protocols
 A major problem of single shared
channel schemes is that the
probability of collision increases with
the number of nodes.
 It has two approaches first using
separate channel for data and signal
messages.
 Second is using multiple channel for
data transmissions Ex : multichannel
CSMA, MMAC etc.
Multi channel CSMA MAC
protocol
 Divides the total available bandwidth (W)
into N distinct channels of W/N
bandwidth each.
 A transmitter would use carrier sensing
to see if the channel it last used is free.
 It uses the last used channel if found
free. Otherwise, another free channel is
chosen at random.
 If no free channel is found, the node
should back off and retry later.
Multichannel medium access
control
(MMAC) Utilizes multiple channels by switching
among them dynamically unlike the
earlier protocol.
 MMAC is an adaptation to the DCF in
order to use multiple channels.
 Time is divided into multiple fixed time
beacon intervals with small ATIM
window in beginning.
 Every node maintains a preferred
channel list (PCL) that stores channel
priorities.
Continued
 Suppose anode wants to transmit a
data packet it sends out an ATIM
packet along with its PCL.
 Receiver compares sender’s PCL with
its own and selects appropriate
channel for use and responds for the
following in ATIM ACK packet.
 If accepted sender replies with ATIM-
RES packet otherwise wait till the next
beacon frame.
Quality of Services
 QoS are the specific services like low
delay, high throughput etc. expected
from a network by an application.
 Issues Affecting QoS.
 QoS aware MAC protocols.
 An example of each type.
Issues affecting QoS
 Several issues need to be considered
in context of providing QoS in Ad-hoc
networks.
 All the layers should take part in
providing QoS.
 Some of the issue affecting are listed
next.
Continued
 Signaling
- in order to reserve, maintain resources.
- Should be performed reliably.
- Minimum overhead.
 Routing
- if application needs guaranteed bandwidth and low
delay then they should be QoS aware.
- nodes in the nodes should have sufficient resources to
provide QoS.
 Service model
- Specifies the framework within which services are
provided in a network..
QoS aware MAC protocols.
 The MAC layer protocol should
support resource reservation and real
time (rt) traffic.
 It needs to be related with above layer.
 These protocols can be further
classified as: synchronous and
asynchronous.
 Discussion of one protocol for each
category is done next.
Cluster TDMA
 Organization of nodes is in clusters.
 A cluster head coordinates the
activities of the nodes.
 A common, globally synchronous
slotted TDMA frame is defined among
clusters.
 Slots can be reserved by rt traffic and
free slots are used by non-real-time
(nrt) data.
 However, time synchronization is a
Real-time MAC (RT-MAC)
 In earlier protocols, packets that have
missed their deadlines are still
retransmitted, even though they are
not useful any more.
 This scheme uses scheme uses a
packet transmission deadline and an
enhanced collision avoidance scheme.
 For every rt packet a time stamp is
associated.
Continued.
 Sending nodes checks the expiration
of packet at three point, expired
packets are dropped.
 Sender chooses the back off value
from contention window and sends it
in packet header.
 Collision window (CW) is a function of
number of nodes.
Future directions
 Hidden and exposed terminal issues.
 Energy conservation issues.
 Antenna related issues.
Conclusion
 In this presentation a broad overview of
research work conducted in the field of
ad hoc wireless networks with respect to
MAC protocols is given.
 Discussed many schemes and identified
their salient features and also discussed
issues of collision resolution, power
conservation, multiple channels,
advantages of using directional antennas
and QoS.
Thank
You.

More Related Content

What's hot

An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessnabil_alsharafi
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access ControlSonali Chauhan
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh meenamunesh
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Networkdiala wedyan
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methodsnizam143
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 

What's hot (19)

An energy efficient mac protocol for wireless
An energy efficient mac protocol for wirelessAn energy efficient mac protocol for wireless
An energy efficient mac protocol for wireless
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mac
MacMac
Mac
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
MAC seminar
MAC seminarMAC seminar
MAC seminar
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
3.Medium Access Control
3.Medium Access Control3.Medium Access Control
3.Medium Access Control
 
Lect21 09-11
Lect21 09-11Lect21 09-11
Lect21 09-11
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh seminar report on multiple access control protocol submitted by munesh
seminar report on multiple access control protocol submitted by munesh
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
A preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor NetworkA preamble-based approach for Providing QOS support in Wireless Sensor Network
A preamble-based approach for Providing QOS support in Wireless Sensor Network
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 

Viewers also liked

Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-machinalala
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Controlanishgoel
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 

Viewers also liked (15)

325
325325
325
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Medium Access Control
Medium Access ControlMedium Access Control
Medium Access Control
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to Technical seminar

Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)swayambhoo
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTPrasant Misra
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptxHirazNor
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...Wendy Hager
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNIRJET Journal
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Editor Jacotech
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks IJECEIAES
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 

Similar to Technical seminar (20)

ShortPaper
ShortPaperShortPaper
ShortPaper
 
mn paper
mn papermn paper
mn paper
 
Swayambhoo Presentation (2)
Swayambhoo Presentation (2)Swayambhoo Presentation (2)
Swayambhoo Presentation (2)
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
Mac
MacMac
Mac
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
Unit_3_WSN.pptx
Unit_3_WSN.pptxUnit_3_WSN.pptx
Unit_3_WSN.pptx
 
W13-L1&2.pptx
W13-L1&2.pptxW13-L1&2.pptx
W13-L1&2.pptx
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
PROGRESS 1& 2.ppt
PROGRESS 1& 2.pptPROGRESS 1& 2.ppt
PROGRESS 1& 2.ppt
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSNA Literature Survey on Energy Efficient MAC Protocols For WSN
A Literature Survey on Energy Efficient MAC Protocols For WSN
 
Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...Survey on energy efficiency in wireless sensor network using mac protocol wit...
Survey on energy efficiency in wireless sensor network using mac protocol wit...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...
 
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...
 
Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks Elastic hybrid MAC protocol for wireless sensor networks
Elastic hybrid MAC protocol for wireless sensor networks
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Final prentation M.TECH ( PPT )
Final prentation  M.TECH ( PPT )Final prentation  M.TECH ( PPT )
Final prentation M.TECH ( PPT )
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Technical seminar

  • 1. Ad-Hoc Network Architecture and protocols of Medium Access Control (MAC) Layer Under the Supervision of Dr. M. P. Singh Akansha Verma M.Tech, 2nd Year Reg. no: 1328014 Computer Science & Engineering
  • 2. Outline  Introduction  Key properties  Applications  Important Issues  Mac Layer in Ad-Hoc networks  Need for Special MAC protocols  Classification  QoS  Conclusion
  • 3. What are ad Hoc Networks?  A wireless network which does not have a infrastructure and is self adaptive and organizing is known as ad Hoc network.  In these network any device can associate with another device within its link range.
  • 4.
  • 5. Characteristics  Don’t have any infrastructure.  Spontaneously Deployable.  Dynamic.  Multihop Based.  Adaptable.  Usually Mobile.
  • 6. Technical Aspects  Consists of Multiple nodes and Links.  Links are influenced by nodes behavior and link properties.  As this network is dynamic it should cope up with issues like restructuring of links.  Routing.
  • 7. Applications  In case of natural disaster.  Military applications.  Mobile Computing etc.  Industrial and Scientific Applications.
  • 8. Important Issues  Limited Bandwidth -Wireless Media in tightly controlled and has limitations.  Error Prone - Factors like Multiple access, Signal fading, Additional Noise and interference cause errors .  Frequent change in Topology - Dynamic Nature of network and Mobility cause unpredictable changes.
  • 9. Continued.  Routing - Earlier protocols require a static network for finding optimal routes but here network in dynamic.  Security -The information transferred should be secure.  Energy Conservation - Sometimes the node may have limited battery supply.
  • 10. Mac Layer in Ad-Hoc networks  Responsibilities of a MAC layer in any networks are a vast some of which include: - Error Correction. - Framing, Physical Addressing, Flow Control, Error Control. - Control of conflicts between nodes for medium accessing. - Efficiency and reliability.
  • 11. Need for Special MAC Protocols  The usual CSMA and its variants cannot be used.  Because of fading of signal in wireless media which remain undetected at receiver.  Hidden terminal problem  Exposed terminal problem
  • 12.
  • 13. Classification  Mac Schemes can be classified basically in Contention free and contention based.  Contention free scheme used predefined assignments (ex time in TDMA) which is good for static networks.  Contention Based are preferred for Ad-Hoc networks.
  • 15. Continued.  Classification of MAC protocols can be done on different grounds like : - Sender initiated or Receiver initiated. - Power aware. - Single channel or multiple channel. - Quality of Service aware or not.  The further classification is done on these major points.
  • 16. General MAC protocols  These are the basic MAC protocols from which various other protocols are derived.  Some of the examples includes MACA, MACAW, FAMA etc.
  • 17. Multiple access collision avoidance (MACA)  Introduced to solved hidden and exposed terminal problems.  Uses RTS-CTS mechanism for data transfer.  Key idea is that any neighboring node that hear the RTS or CTS defers its transmission.  Its effective because RTS and CTS are significantly smaller then the data packet so their collision causes less
  • 18. Continued  Not always solves the hidden terminal problem.  Lack of acknowledge of data packet.  Various other variants of MACA were later introduced like: MACAW, MACA- BI, FAMA etc.
  • 19. Power Aware MAC protocols  It is crucial to conserve the energy of mobile nodes as they are battery powered.  Collision is the main cause of power loss.  Transceivers should be kept in standby mode when no transmission is occurring Ex: PAMAS .  An optimum power for transmission should be used instead of full transmission power Ex: PCM.
  • 20. Power aware MAC signalling (PAMAS)  Uses separate channels for data and control packets.  While receiving a data on data channel it sends busy tone on signal channel.  Each node decides on its own when to sleep based on activity of its neighboring nodes.  Usually switches off when it has nothing to transmit or neighbor is
  • 21. Power control medium access control (PCM)  Unlike the other approaches which alternates between sleep and wake state, it sends RTS and CTS with maximum power.  Whereas data is sent with minimum power.  Method of determining the power levels is explained further.
  • 23. Continued.  Node D sends the RTS to node E at a transmit power level Pmax, and also includes this value in the packet.  E measures the actual signal strength, say Pr, of the received RTS packet.  Based on Pmax, Pr and the noise level at its location, E then computes the minimum necessary power level (say, Psuff) that would actually be sufficient for use by D.  Now, when E responds with the CTS packet using the maximum power it has available, it includes the value of Psuff that D subsequently uses for data
  • 24. Drawbacks  Accurate estimation of signal strength required.  dynamics of wireless signal propagation due to fading and shadowing effect may degrade its performance.  Difficulty in implementing frequent changes in the transmit power levels.
  • 25. Multiple channel protocols  A major problem of single shared channel schemes is that the probability of collision increases with the number of nodes.  It has two approaches first using separate channel for data and signal messages.  Second is using multiple channel for data transmissions Ex : multichannel CSMA, MMAC etc.
  • 26. Multi channel CSMA MAC protocol  Divides the total available bandwidth (W) into N distinct channels of W/N bandwidth each.  A transmitter would use carrier sensing to see if the channel it last used is free.  It uses the last used channel if found free. Otherwise, another free channel is chosen at random.  If no free channel is found, the node should back off and retry later.
  • 27. Multichannel medium access control (MMAC) Utilizes multiple channels by switching among them dynamically unlike the earlier protocol.  MMAC is an adaptation to the DCF in order to use multiple channels.  Time is divided into multiple fixed time beacon intervals with small ATIM window in beginning.  Every node maintains a preferred channel list (PCL) that stores channel priorities.
  • 28. Continued  Suppose anode wants to transmit a data packet it sends out an ATIM packet along with its PCL.  Receiver compares sender’s PCL with its own and selects appropriate channel for use and responds for the following in ATIM ACK packet.  If accepted sender replies with ATIM- RES packet otherwise wait till the next beacon frame.
  • 29. Quality of Services  QoS are the specific services like low delay, high throughput etc. expected from a network by an application.  Issues Affecting QoS.  QoS aware MAC protocols.  An example of each type.
  • 30. Issues affecting QoS  Several issues need to be considered in context of providing QoS in Ad-hoc networks.  All the layers should take part in providing QoS.  Some of the issue affecting are listed next.
  • 31. Continued  Signaling - in order to reserve, maintain resources. - Should be performed reliably. - Minimum overhead.  Routing - if application needs guaranteed bandwidth and low delay then they should be QoS aware. - nodes in the nodes should have sufficient resources to provide QoS.  Service model - Specifies the framework within which services are provided in a network..
  • 32. QoS aware MAC protocols.  The MAC layer protocol should support resource reservation and real time (rt) traffic.  It needs to be related with above layer.  These protocols can be further classified as: synchronous and asynchronous.  Discussion of one protocol for each category is done next.
  • 33. Cluster TDMA  Organization of nodes is in clusters.  A cluster head coordinates the activities of the nodes.  A common, globally synchronous slotted TDMA frame is defined among clusters.  Slots can be reserved by rt traffic and free slots are used by non-real-time (nrt) data.  However, time synchronization is a
  • 34. Real-time MAC (RT-MAC)  In earlier protocols, packets that have missed their deadlines are still retransmitted, even though they are not useful any more.  This scheme uses scheme uses a packet transmission deadline and an enhanced collision avoidance scheme.  For every rt packet a time stamp is associated.
  • 35. Continued.  Sending nodes checks the expiration of packet at three point, expired packets are dropped.  Sender chooses the back off value from contention window and sends it in packet header.  Collision window (CW) is a function of number of nodes.
  • 36. Future directions  Hidden and exposed terminal issues.  Energy conservation issues.  Antenna related issues.
  • 37. Conclusion  In this presentation a broad overview of research work conducted in the field of ad hoc wireless networks with respect to MAC protocols is given.  Discussed many schemes and identified their salient features and also discussed issues of collision resolution, power conservation, multiple channels, advantages of using directional antennas and QoS.