SlideShare a Scribd company logo
Wireless and Mobile Computing
Delivered
By
Khadija Manzoor
Department of CS& IT
University of Gujrat
Lecture Agenda
 The aim of this lecture is to provide the reader
with a comprehensive view of the role and details
of the protocols that define and control access to
the wireless channel, i.e., wireless media access
protocols (MAC) protocols.
 Mac layer for Wireless and its issues
 MAC Classifications
 Design Goals
Introduction
 In the broadest terms, a wireless network consists of nodes
that communicate by exchanging “packets” via radio
waves.
 These packets can take two forms. A unicast packet
contains information that is addressed to a specific node,
whereas a multicast packet distributes the information to a
group of nodes.
 The MAC protocol simply determines when a node is
allowed to transmit its packets, and typically controls all
access to the physical layer.
Introduction
 The specific functions associated with a MAC protocol vary
according to the system requirements and application.
 For example, wireless broadband networks carry data
streams with strict quality of service (QoS) requirements.
This requires a complex MAC protocol that can
adaptively manage the bandwidth resources in order to
meet these demands.
 Design and complexity are also affected by the network
architecture, communication model, and duplexing
mechanism employed.
Issues
 The main issues need to be addressed while designing a
MAC protocol for ad hoc wireless networks:
• Bandwidth efficiency is defined at the ratio of the bandwidth
used for actual data transmission to the total available
bandwidth. The MAC protocol for ad-hoc networks should
maximize it.
• Quality of service support is essential for time-critical
applications. The MAC protocol for ad-hoc networks should
consider the constraint of ad-hoc networks.
• Synchronization can be achieved by exchange of control
packets.
Issues
 The main issues need to be addressed while designing a MAC
protocol for ad hoc wireless networks:
 Hidden and exposed terminal problems:
 Hidden nodes:
 Hidden stations: Carrier sensing may fail to detect
another station.
 Fading: The strength of radio signals diminished rapidly
with the distance from the transmitter.
 Exposed nodes:
 Exposed stations: B is sending to A. C can detect it. C
might want to send to E but conclude it cannot transmit
because C hears B.
 Collision masking: The local signal might drown out
the remote transmission.
 Error-Prone Shared Broadcast Channel
 Distributed Nature/Lack of Central Coordination
 Mobility of Nodes: Nodes are mobile most of the time.
Near and far terminals
 Consider the situation A and B are both sending with the same
transmission power. As the signal strength decreases
proportionally to the square of the distance, B’s signal drowns out
A’s signal.
 As a result, C cannot receive A’s transmission.
 Now think of C as being an intermediary for sending rights (e.g.,
C acts as a base station coordinating media access). In this case,
terminal B would already drown out terminal A on the physical
layer. C in return would have no chance of applying a fair scheme
as it would only hear B.
Near and far terminals
 The near/far effect is a severe problem of wireless networks. All
signals should arrive at the receiver with more or less the same
strength.
 Otherwise a person standing closer to somebody could always
speak louder than a person further away. Even if the senders were
separated by code, the closest one would simply drown out the
others.
 Precise power control is needed to receive all senders with the
same strength at a receiver.
issues
 The combination of network architecture, communication
model, and duplexing mechanism define the general
framework within which a MAC protocol is realized.
 Decisions made here will define how the entire system
operates and the level of interaction between individual
nodes. They will also limit what services can be offered and
define MAC protocol design.
 However, the unique characteristics of wireless
communication must also be taken into consideration.
issues
 Here, we explore these physical constraints and discuss
their impact on protocol design and performance.
 Radio waves propagate through an unguided medium
that has no absolute or observable boundaries and is
vulnerable to external interference. Thus, wireless links
typically experience high bit error rates and exhibit
asymmetric channel qualities.
 Techniques such as channel coding, bit interleaving,
frequency/space diversity, and equalization increase the
survivability of information transmitted across a
wireless link.
 However, the presence of asymmetry means that
The 802.11 MAC Sublayer
Protocol
Design goals of a MAC Protocol
 Design goals of a MAC protocol for ad hoc wireless networks
• The operation of the protocol should be distributed.
• The protocol should provide QoS support for real-time traffic.
• The access delay, which refers to the average delay experienced by
any packet to get transmitted, must be kept low.
• The available bandwidth must be utilized efficiently.
• The protocol should ensure fair allocation of bandwidth to nodes.
Design goals of a MAC Protocol
• Control overhead must be kept as low as possible.
• The protocol should minimize the effects of hidden and exposed
terminal problems.
• The protocol must be scalable to large networks.
• It should have power control mechanisms.
• The protocol should have mechanisms for adaptive data rate control.
• It should try to use directional antennas.
• The protocol should provide synchronization among nodes.
Classifications of MAC protocols
 Ad hoc network MAC protocols can be classified into
four types:
• Contention-based protocols
• Contention-based protocols with reservation mechanisms
• Contention-based protocols with scheduling mechanisms
• Other MAC protocols
15
MAC Protocols for Ad Hoc
Wireless Networks
Contention-Based
Protocols
Contention-based
protocols with
reservation mechanisms
Other MAC
Protocols
Contention-based
protocols with
scheduling mechanisms
Sender-Initiated
Protocols
Receiver-Initiated
Protocols
Synchronous
Protocols
Asynchronous
Protocols
Single-Channel
Protocols
Multichannel
Protocols
MACAW
FAMA
BTMA
DBTMA
ICSMA
RI-BTMA
MACA-BI
MARCH
D-PRMA
CATA
HRMA
RI-BTMA
MACA-BI
MARCH
SRMA/PA
FPRP
MACA/PR
RTMAC
Directional
Antennas
MMAC
MCSMA
PCM
RBAR
Classifications of MAC Protocols
 Contention-based protocols
• Sender-initiated protocols: Packet transmissions are initiated by
the sender node.
• Single-channel sender-initiated protocols: A node that wins
the contention to the channel can make use of the entire
bandwidth.
• Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
• Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
Classifications of MAC Protocols
 Contention-based protocols with reservation
mechanisms
• Synchronous protocols: All nodes need to be synchronized. Global
time synchronization is difficult to achieve.
• Asynchronous protocols: These protocols use relative time information
for effecting reservations.
Classifications of MAC Protocols
 Contention-based protocols with scheduling
mechanisms
• Node scheduling is done in a manner so that all nodes are
treated fairly and no node is starved of bandwidth.
• Scheduling-based schemes are also used for enforcing priorities
among flows whose packets are queued at nodes.
• Some scheduling schemes also consider battery characteristics.
 Other protocols are those MAC protocols that do not
strictly fall under the above categories.

More Related Content

Similar to W13-L1&2.pptx

1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
Rahul Singh
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
ABYTHOMAS46
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
SANTHAKUMARP5
 
Tmac
TmacTmac
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
KGunasekaran1
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless Network
Dushhyant Kumar
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
Dushhyant Kumar
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
Akansha Verma
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanambitlick
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
IDES Editor
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
IJMIT JOURNAL
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
IJERA Editor
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
IJERA Editor
 

Similar to W13-L1&2.pptx (20)

1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
mn paper
mn papermn paper
mn paper
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Tmac
TmacTmac
Tmac
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless Network
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 

More from HirazNor

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
HirazNor
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
HirazNor
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
HirazNor
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
HirazNor
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
HirazNor
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptx
HirazNor
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
HirazNor
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
HirazNor
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
HirazNor
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
HirazNor
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
HirazNor
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
HirazNor
 

More from HirazNor (14)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptx
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
ambekarshweta25
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 

W13-L1&2.pptx

  • 1. Wireless and Mobile Computing Delivered By Khadija Manzoor Department of CS& IT University of Gujrat
  • 2. Lecture Agenda  The aim of this lecture is to provide the reader with a comprehensive view of the role and details of the protocols that define and control access to the wireless channel, i.e., wireless media access protocols (MAC) protocols.  Mac layer for Wireless and its issues  MAC Classifications  Design Goals
  • 3. Introduction  In the broadest terms, a wireless network consists of nodes that communicate by exchanging “packets” via radio waves.  These packets can take two forms. A unicast packet contains information that is addressed to a specific node, whereas a multicast packet distributes the information to a group of nodes.  The MAC protocol simply determines when a node is allowed to transmit its packets, and typically controls all access to the physical layer.
  • 4. Introduction  The specific functions associated with a MAC protocol vary according to the system requirements and application.  For example, wireless broadband networks carry data streams with strict quality of service (QoS) requirements. This requires a complex MAC protocol that can adaptively manage the bandwidth resources in order to meet these demands.  Design and complexity are also affected by the network architecture, communication model, and duplexing mechanism employed.
  • 5.
  • 6. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks: • Bandwidth efficiency is defined at the ratio of the bandwidth used for actual data transmission to the total available bandwidth. The MAC protocol for ad-hoc networks should maximize it. • Quality of service support is essential for time-critical applications. The MAC protocol for ad-hoc networks should consider the constraint of ad-hoc networks. • Synchronization can be achieved by exchange of control packets.
  • 7. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks:  Hidden and exposed terminal problems:  Hidden nodes:  Hidden stations: Carrier sensing may fail to detect another station.  Fading: The strength of radio signals diminished rapidly with the distance from the transmitter.  Exposed nodes:  Exposed stations: B is sending to A. C can detect it. C might want to send to E but conclude it cannot transmit because C hears B.  Collision masking: The local signal might drown out the remote transmission.  Error-Prone Shared Broadcast Channel  Distributed Nature/Lack of Central Coordination  Mobility of Nodes: Nodes are mobile most of the time.
  • 8. Near and far terminals  Consider the situation A and B are both sending with the same transmission power. As the signal strength decreases proportionally to the square of the distance, B’s signal drowns out A’s signal.  As a result, C cannot receive A’s transmission.  Now think of C as being an intermediary for sending rights (e.g., C acts as a base station coordinating media access). In this case, terminal B would already drown out terminal A on the physical layer. C in return would have no chance of applying a fair scheme as it would only hear B.
  • 9. Near and far terminals  The near/far effect is a severe problem of wireless networks. All signals should arrive at the receiver with more or less the same strength.  Otherwise a person standing closer to somebody could always speak louder than a person further away. Even if the senders were separated by code, the closest one would simply drown out the others.  Precise power control is needed to receive all senders with the same strength at a receiver.
  • 10. issues  The combination of network architecture, communication model, and duplexing mechanism define the general framework within which a MAC protocol is realized.  Decisions made here will define how the entire system operates and the level of interaction between individual nodes. They will also limit what services can be offered and define MAC protocol design.  However, the unique characteristics of wireless communication must also be taken into consideration.
  • 11. issues  Here, we explore these physical constraints and discuss their impact on protocol design and performance.  Radio waves propagate through an unguided medium that has no absolute or observable boundaries and is vulnerable to external interference. Thus, wireless links typically experience high bit error rates and exhibit asymmetric channel qualities.  Techniques such as channel coding, bit interleaving, frequency/space diversity, and equalization increase the survivability of information transmitted across a wireless link.  However, the presence of asymmetry means that
  • 12. The 802.11 MAC Sublayer Protocol
  • 13. Design goals of a MAC Protocol  Design goals of a MAC protocol for ad hoc wireless networks • The operation of the protocol should be distributed. • The protocol should provide QoS support for real-time traffic. • The access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low. • The available bandwidth must be utilized efficiently. • The protocol should ensure fair allocation of bandwidth to nodes.
  • 14. Design goals of a MAC Protocol • Control overhead must be kept as low as possible. • The protocol should minimize the effects of hidden and exposed terminal problems. • The protocol must be scalable to large networks. • It should have power control mechanisms. • The protocol should have mechanisms for adaptive data rate control. • It should try to use directional antennas. • The protocol should provide synchronization among nodes.
  • 15. Classifications of MAC protocols  Ad hoc network MAC protocols can be classified into four types: • Contention-based protocols • Contention-based protocols with reservation mechanisms • Contention-based protocols with scheduling mechanisms • Other MAC protocols 15 MAC Protocols for Ad Hoc Wireless Networks Contention-Based Protocols Contention-based protocols with reservation mechanisms Other MAC Protocols Contention-based protocols with scheduling mechanisms Sender-Initiated Protocols Receiver-Initiated Protocols Synchronous Protocols Asynchronous Protocols Single-Channel Protocols Multichannel Protocols MACAW FAMA BTMA DBTMA ICSMA RI-BTMA MACA-BI MARCH D-PRMA CATA HRMA RI-BTMA MACA-BI MARCH SRMA/PA FPRP MACA/PR RTMAC Directional Antennas MMAC MCSMA PCM RBAR
  • 16. Classifications of MAC Protocols  Contention-based protocols • Sender-initiated protocols: Packet transmissions are initiated by the sender node. • Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth. • Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels. • Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.
  • 17. Classifications of MAC Protocols  Contention-based protocols with reservation mechanisms • Synchronous protocols: All nodes need to be synchronized. Global time synchronization is difficult to achieve. • Asynchronous protocols: These protocols use relative time information for effecting reservations.
  • 18. Classifications of MAC Protocols  Contention-based protocols with scheduling mechanisms • Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. • Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. • Some scheduling schemes also consider battery characteristics.  Other protocols are those MAC protocols that do not strictly fall under the above categories.