SlideShare a Scribd company logo
1 of 96
Download to read offline
Chapter 6: MAC Protocols for Ad
Chapter 6: MAC Protocols for Ad
Hoc Wireless Networks
Jang Ping Sheu
Jang Ping Sheu
Outline
Outline
„ Issues in designing a MAC protocol
„ Contention-based protocols
„ Contention-based protocols with reservation
mechanisms
„ Contention-based protocols with scheduling
p g
mechanisms
„ Other protocols
„ Other protocols
„ Summary
J. P. Sheu
Issues in Designing a MAC Protocol
Issues in Designing a MAC Protocol
„ Bandwidth Efficiency
„ QoS support
„ Synchronization
„ Hidden and Exposed Terminal Problems
„ Error-Prone Share Broadcast Channel
„ Error-Prone Share Broadcast Channel
„ Distributed Nature/Lack of Central
Coordination
Coordination
„ Mobility of Nodes
J. P. Sheu
S2
R1
S1
S3
R2
T i i f N d S1
Transmission range of Node S2
Packet transmission
Transmission range of Node S1 Packet transmission
Transmission that is not permitted
Figure 6.1 Hidden and exposed terminal problems
J. P. Sheu
Design Goals of a MAC Protocol
es g Goa s o a C otoco
„ Provided QoS support for real-time traffic
„ Low access delay
„ Low access delay
„ Bandwidth (BW) efficiently used
F i ll ti f BW t d
„ Fair allocation of BW to nodes
„ Low control overhead
„ Scalable to large networks
„ Support power control and time synchronization
„ Support power control and time synchronization
„ Adaptive data rate control
J. P. Sheu
Classifications of MAC Protocols
Classifications of MAC Protocols
„ Contention-based protocols
„ A node does not make any resource reservation a priori
y p
„ It cannot provide QoS guarantee
„ Two types of random access
yp
„ Sender-initiated protocols
„ Single-channel sender-initiated protocols
„ Multi-channel sender-initiated protocols
„ Receiver-initiated protocols
J. P. Sheu
Classifications of MAC Protocols
( t )
(cont.)
„ Contention-based protocols with reservation
mechanisms
S l i ffi
„ Support real-time traffic
„ Reserve bandwidth a priori
S h t l
„ Synchronous protocols
„ Global time synchronization is difficult to achieve
„ Asynchronous protocols
„ Asynchronous protocols
„ Not require global synchronization
„ Contention based protocols with scheduling
„ Contention-based protocols with scheduling
„ Packet scheduling at nodes and
„ Scheduling nodes for access to the channel
J. P. Sheu
„ Scheduling nodes for access to the channel
Figure 6 2: MAC protocols for ad hoc network
Figure 6.2: MAC protocols for ad hoc network
J. P. Sheu
Contention-Based Protocols
MACA Protocol
MACA Protocol
„ Multiple access collision avoidance protocol
proposed by Karn in 1990
„ MACA does not make use of carrier-sensing
„ Request-to-send (RTS) clear-to-send (CTS)
„ Request to send (RTS), clear to send (CTS),
DATA messages
„ Use binary exponential back off (BEB) algorithm
„ Use binary exponential back-off (BEB) algorithm
for retry
B th th RTS d CTS k t th
„ Both the RTS and CTS packets carry the
expected duration of the data packet transmission
J. P. Sheu
MACA Protocol (cont )
MACA Protocol (cont.)
„ A node near the receiver (overcome hidden node
problem)
problem)
„ Hearing the CTS packet, defers its transmission
till the receiver receives the data packet
till the receiver receives the data packet
„ A node near the sender (overcome exposed node
problem)
problem)
„ A node that only hears the RTS is free to transmit
simultaneously when the sender is transmitting
simultaneously when the sender is transmitting
data
J. P. Sheu
Neighbor Sender Receiver Neighbor
RTS RTS
CTS CTS
DATA DATA
Figure 6.3 Packet transmission in MACA
J. P. Sheu
MACAW Protocol
MACAW Protocol
„ Back-off mechanism used in MACA starves
flows (See Figure 6.4)
( g )
„ Back-off algorithm has been modified by
Bharghavan in 1994
g
„ Packet header has an additional filed carrying the
current back-off counter value of the transmitting node
„ A node receiving the packet copies this value into its
own back-off counter
J. P. Sheu
R1 S1 S2
R1 S1
R2
×
R2
Figure 6.4 Example topology
J. P. Sheu
MACAW Protocol (cont )
MACAW Protocol (cont.)
„ To prevent large variations in the back-off values
„ A multiplicative increase and linear decrease
(MILD) is used in MACAW
„ Collision: back-off is increased by a multiplicative
f t (1 5)
factor (1.5)
„ Successful: back-off is decreased by one
Implement per flow fairness as opposed to the per
„ Implement per flow fairness as opposed to the per
node fairness
„ Multiple queues at every node (running back off
„ Multiple queues at every node (running back-off
algorithm independently)
J. P. Sheu
MACAW Protocol (cont )
MACAW Protocol (cont.)
A l k ACK d i MACAW
„ An extra control packet ACK used in MACAW
„ If ACK is not received by sender, the sender would
b i i RTS f h k
retry by transmitting an RTS for the same packet
„ The back-off counter is incremented
„ The receiver, instead sending back a CTS, sends an
ACK for the packet received
E d d bl ( Fi 6 5)
„ Exposed node problem (see Figure 6.5)
„ Before transmitting the data packet, the source node
t it th d t di (DS) k t t RTS
transmits the data-sending (DS) packet to ensure RTS-
CTS exchange successful
J. P. Sheu
R1 S1 R2
S2
Figure 6.5 Example topology
S2 R2 S1
R1
RRTS RRTS
Figure 6.6 Example topology.
J. P. Sheu
MACAW Protocol (cont )
MACAW Protocol (cont.)
„ Another control packet: request for request to
send (RRTS), See Figure 6.6
S h i i i f i d b d
„ Synchronization information needs to be propagated to
the concerned nodes
„ If a node had received an RTS previously for which it
„ If a node had received an RTS previously for which it
was not able to respond because there exists on-going
transmission, then it waits for the next contention
i d d i
period and transmits RRTS
„ Figure 6.7 shows the operation of the MACAW
t l
protocol
„ RTS-CTS-DS-DATA-ACK
J. P. Sheu
N1 S R N2
RTS RTS
CTS CTS
CTS CTS
DS DS
DATA DATA
ACK ACK
Figure 6 7 Packet exchange in MACAW
Figure 6.7 Packet exchange in MACAW.
J. P. Sheu
FAMA: Floor Acquisition Multiple
Access Protocols
„ Channel access consists of a carrier-sensing
operation and a collision avoidance
„ Carrier-sensing by the sender, followed by the
RTS-CTS control packet exchange.
D i i b lli i f h d i f
„ Data transmission to be collision free, the duration of
an RTS must be at least twice the maximum channel
propagation delay
p opagat o de ay
„ Two FAMA protocol variants
„ RTS-CTS exchange with no carrier sensing (MACA)
„ RTS CTS exchange with no carrier sensing (MACA)
„ RTS-CTS exchange with non-persistent carrier
sensing (FAMA-NTR)
J. P. Sheu
FAMA-NTR
FAMA-NTR
B f di k h d h h l
„ Before sending a packet, the sender senses the channel
„ If channel is busy, the sender back-off a random time and
t i l t
retries later
„ If the channel is free, the sender sends RTS and waits for
a CTS packet
a CTS packet
„ If the sender cannot receive a CTS, it takes a random
back-off and retries later
back off and retries later
„ If the sender receives a CTS, it can start transmission data
packet
p
„ In order to allow the sender to send a burst of packets, the
receiver is made to wait a time duration τ seconds after a
J. P. Sheu
packet is received
BTMA: Busy Tone Multiple Access
P t l
Protocols
Th i i h l i li i
„ The transmission channel is split into:
„ Data packet transmissions: a data channel
„ Busy tone signal: a control channel
„ Busy tone signal: a control channel
„ When a node is ready for transmission, it senses the channel
to check whether the busy tone is active
to check whether the busy tone is active
„ If not, it turns on busy tone signal and starts data transmission
„ Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
„ When a node is transmitting, no other node in the two-hop
i hb h d f th t itti d i itt d t
neighborhood of the transmitting node is permitted to
simultaneously transmit (See Figure 6.8)
J. P. Sheu
N1
Both nodes N1 and N2
transmit the busy tone.
N2
Transmission range of Node N1
Transmission range of Node N2
Region in which simultaneous transmission are not
possible when N1 is transmission data
Transmission range of Node N1
Busy tone
Figure 6.8 Transmission in BTMA.
J. P. Sheu
DBTMA: Dual Busy Tone Multiple
Access Protocol
Access Protocol
„ The transmission channel is divided into:
„ The data channel Æ data packet transmission
„ The control channel Æ RTS, CTS, busy tones
„ Use two busy tones on the control channel, BTt and BTr.
y , t r
„ BTt : indicate that it is transmitting on the data channel
„ BT : indicate that it is receiving on the data channel
„ BTr: indicate that it is receiving on the data channel
„ Two busy tone signals are two sine waves at different
frequencies
q
J. P. Sheu
DBTMA: Dual Busy Tone Multiple
Access Protocol (cont )
Access Protocol (cont.)
Wh d i d t t it d t k t (S
„ When a node is ready to transmit a data packet (See
Figure 6.9)
Fi t th h l t d t i h th th BT i l i ti
„ First sense the channel to determine whether the BTr signal is active
„ No BTr signalÆ transmit RTS packet
„ On receiving the RTS packets, checks whether the BTt tone is active
On receiving the RTS packets, checks whether the BTt tone is active
„ No BTt signalÆ Sending CTS packet and turn on the BTr signal
„ Sender: receive CTS Æ turn on BTt signal Æ start data Æ turn off BTt
signal
„ Receiver: receive data Æ turn off BTr signal
DBTMA h b tt t k tili ti th RTS/CTS
„ DBTMA has better network utilization than RTS/CTS
based protocol (why?)
J. P. Sheu
RTS CTS BTt
Control Channel
DATA
Data Channel
Sender
RTS CTS BTr
Control Channel
Receiver
DATA
Data Channel
Receiver
Figure 6.9 Packet transmission in DBTMA.
J. P. Sheu
RI-BTMA: Receiver-Initiated Busy
Tone Multiple Access Protocol
Tone Multiple Access Protocol
The a ailable band idth is di ided into t o
„ The available bandwidth is divided into two
slotted channels:
Th d t h l Æ d t k t t i i
„ The data channel Æ data packet transmission
„ Only if it finds the busy tone to be absent on the
control channel
control channel
„ The control channelÆ busy tone signal
D t k t bl d th t l d t k t
„ Data packet: a preamble and the actual data packet
„ The busy tone serves two purposes:
„ Ack the sender the successful of receiving preamble
„ Inform the nearby hidden nodes the impending
J. P. Sheu
transmission
RI-BTMA: Receiver-Initiated Busy
T M lti l A P t l ( )
Tone Multiple Access Protocol (cont.)
„ The operation of the RI BTMA protocol (See Figure 6 10)
„ The operation of the RI-BTMA protocol (See Figure 6.10)
„ Two types
the basic protocol
„ the basic protocol
„ No backlog buffers Æ packets that suffer collisions cannot be
retransmitted
„ the controlled protocol
„ Backlogged mode Æ backlog buffer is non-empty
„ Backlog buffers: transmitting a backlogged packet in the
next idle slot with a probability q (why?)
Non backlogged mode Æ transmitting a non backlogged packet
„ Non-backlogged mode Æ transmitting a non-backlogged packet
in the next idle slot with a probability p (why?)
J. P. Sheu
Control Channel
Busy Tone
DATA
Data Channel
Sender
P
Control Channel
R i
Busy Tone
DATA
Data Channel
Receiver
P
Figure 6 10 Packet transmission in RI BTMA
P Preamble Packet
Figure 6.10 Packet transmission in RI-BTMA.
J. P. Sheu
MACA-BI: MACA-By Invitation
MACA-BI: MACA-By Invitation
„ MACA-BI is a receiver-initiated MAC protocol
„ MACA-BI is a receiver-initiated MAC protocol
„ Reduced the number of control packets in MACA protocol (uses three-way
handshake mechanism)
i d d i ( ) Æ d d b di
„ Receiver sends ready to receive (RTR) Æ Sender responds by sending a
DATA packet (See Figure 6.11)
„ The receiver needs to estimate the average arrival rate of packets
g p
„ Problems:
„ Receiver may not have an exact knowledge about the traffic rates
„ The protocol allowing the sender to declare its backlog through the RTS
control packet, if an RTR packet is not arrived within a given timeout
„ Hidden terminal problem is overcome in MACA-BI
„ However, the hidden terminal problem still affects the control packet
transmission
„ RTR packets can collide with DATA packets (See Figure 6.12)
J. P. Sheu
p p ( g )
Sender Receiver Neighbor (hidden terminal
with respect to sender)
RTR RTR
Blocked from
DATA transmitting
Figure 6 11 Packet transmission in MACA BI
Figure 6.11 Packet transmission in MACA-BI
PTR PTR PTR PTR
S1 R1 A R2 S2
PTR1 PTR1 PTR2 PTR2
S1, S2 - Sender nodes
,
R1, R2 - Receiver nodes
A - Neighbor node Figure 6.12 Hidden terminal problem in MACA-BI
J. P. Sheu
MARCH: Media Access with
Reduced Handshake
„ MARCH does not require any traffic prediction mechanism
„ The RTS packet is used only for the first packet of the stream
„ MACA: RTS Æ CTS Æ DATA Æ RTS Æ CTSÆ. . .
„ MACA: RTS Æ CTS Æ DATA Æ RTS Æ CTSÆ. . .
„ MARCH: RTS Æ CTS1 Æ DATA Æ CTS2 Æ DATA Æ… (See Figure
6.13)
Th CTS k t MAC dd f th d i d th t
„ The CTS packet: MAC address of the sender, receiver, and the route
identification number (RTid) (See Figure 6.14)
„ The RTid is used to avoid misinterpretation of CTS packets and
initiation of false CTS-only handshake
„ For example, when node Y received a CTS with RTid = route 1, it does
not respond (See Fig 6 14)
not respond (See Fig. 6.14)
„ The throughput of MARCH is significantly high when compared to
MACA, while the control overhead is much less
J. P. Sheu
A B C D
RTS
CTS
CTS
A B C D
RTS
CTS1 CTS1
DATA
RTS tCSMA
DATA
1 1
CTS CTS
CSMA
CTS2
DATA
CTS
CTS2 tMARCH
DATA
CTS
RTS
CTS3
DATA
CTS
DATA
(a) (b)
Figure 6.13 Handshake mechanism in (a) MACA and (b) MARCH
J. P. Sheu
X
A B C D E
Y
Y
Route 1: A-B-C-D
Route 2: X-C-Y
Fi 6 14 E l T l
Figure 6.14 Example Topology
J. P. Sheu
Contention-Based Protocols with
Reservation Mechanisms
Reservation Mechanisms
D-PRMA: Distributed Packet
Reservation Multiple Access Protocol
Reservation Multiple Access Protocol
„ The channel is divided into fixed and equal sized frames
„ The channel is divided into fixed and equal sized frames
along the time axis. (See Figure 6.15)
„ The RTS/BI and CTS/BI are used for slot reservation and
for overcoming the hidden terminal problem
„ If a terminal wins the contention through mini-slot 1, the
t ( 1) i i l t f thi l t ill b t d t th
extra (m – 1) mini-slots of this slot will be granted to the
terminal as the payload
„ For voice node, the same slot in each subsequent frame can be
, q
reserved until the end of its packet transmission
„ In the other cases, the extra (m – 1) mini-slots are
continuously used for contention and the winner of this
continuously used for contention, and the winner of this
contention will be granted the reservation of the same slot
J. P. Sheu
Frame Length
Slot 2
Slot 1 ……………….. Slot s
Mini-slot 1 Mini-slot 2 …………… Mini-slot m
CTS/BI
RTS/BI CTS/BI
RTS/BI
Figure 6.15 Frame structure in D-PRMA
J. P. Sheu
D-PRMA (cont )
D-PRMA (cont.)
T i iti i t i l d t t i l
„ To prioritize voice terminals over data terminals
„ Voice terminals starts contenting from mini-slot 1 with probability
p = 1 while data terminals can start such content with p < 1
„ Both voice and data terminals can content through the extra (m – 1)
mini-slots with probability p < 1
„ Only the winner of a voice terminal can reserve the same slot in
O y t e w e o a vo ce te a ca ese ve t e sa e s ot
each subsequent frame until the end of packet transmission while
the winner of a data terminal can only use one slot
„ Problems:
„ Problems:
„ When a terminal wins the contention in mini-slot 1, how to prevent
other terminals in the same slot for contention ? (Use RTS/CTS)
„ How to prevent a terminal from contending for a reserved slot in
each subsequent slot ? (Transmit a busy indication (BI) signal
RTS/BI (receiver) (why?) and CTS/BI (sender) in mini-slot 1)
J. P. Sheu
CATA: Collision Avoidance Time
All ti P t l
Allocation Protocol
S b d i d l i
„ Support broadcast, unicast, and multicast
transmissions simultaneously
„ Each frame consists of S slots and each slot is
further divided into five mini-slots
„ CMS1: Slot Reservation (SR)
„ CMS2: RTS
„ CMS3: CTS
„ CMS4: not to send (NTS)
( )
„ DMS: Data transmission
J. P. Sheu
CATA (cont )
CATA (cont.)
„ Each node receives data during the DMS of current slot
transmits an SR in CMS1
„ Every node that transmits data during the DMS of current
„ Every node that transmits data during the DMS of current
slot transmits an RTS in CMS2
„ CMS3 and CMS4 are used as follows:
„ The sender of an intend reservation, if it senses the channel is idle
in CMS1, transmits an RTS in CMS2
„ Then the receiver transmits a CTS in CMS3
„ Then the receiver transmits a CTS in CMS3
„ If the reservation was successful the data can transmit in current
slot and the same slot in subsequent frames
O h i f ll i h l b h h
„ Once the reservation was successfully, in the next slot both the
sender and receiver do not transmit anything during CMS3 and
during CMS4 the sender transmits a NTS
J. P. Sheu
CATA (cont )
CATA (cont.)
„ If a node receives an RTS for broadcast or multicast
during CMS2 or it finds the channel to be free during
CMS2 it remains idle during CMS3 and CMS4
CMS2, it remains idle during CMS3 and CMS4
„ Otherwise it sends a NTS packet during CMS4
A t ti l lti t b d t d th t
„ A potential multicast or broadcast source node that
receives the NTS packet or detecting noise during CMS4,
understands that its reservation is failed
understands that its reservation is failed
„ If it find the channel is free in CMS4, which implies its
reservation was successful
„ CATA works well with simple single-channel half-duplex
radios
J. P. Sheu
Frame Length
Slot 1 Slot 2 . . . . . . . . . Slot S
CMS 1 CMS 2 CMS 3 CMS 4 DMS
Figure 6.16. Frame format in CATA.
J. P. Sheu
HRMA: Hop Reservation Multiple
A P t l
Access Protocol
„ HRMA is a multi-channel MAC protocol, based on half-
duplex very slow frequency hopping spread spectrum (FHSS)
radios
radios
„ Each time slot is assigned a separate frequency channel (See
Figure 6 17)
Figure 6.17)
„ Assumptions
„ L: frequency channels
„ L: frequency channels
„ f0: dedicated synchronized channel frequency
„ The remaining L - 1 frequencies are divided into
( 1)
2
L
M
−
⎢ ⎥
= ⎢ ⎥
⎣ ⎦
frequency pairs denoted by
2
⎣ ⎦
*
( , ), 1, 2 , 3, ....,
i i
f f i M
=
J. P. Sheu
S h i i
Frame Length
Synchronizing
Slot
Slot 1 Slot 2 . . . . . . . Slot M
SYN HR RTS CTS
Figure 6 17 Frame format in HRMA
Figure 6.17. Frame format in HRMA .
J. P. Sheu
HRMA (cont )
HRMA (cont.)
„ Hop reservation (HR) RTS CTS DATA : f
„ Hop reservation (HR), RTS, CTS, DATA : fi
„ ACK: fi*
„ All idle nodes hop to the synchronizing frequency f0 and
d e odes op o e sy c o g eque cy f0 d
exchange synchronization information
„ Synchronizing slot: used to identify the beginning of a
y g y g g
frequency hop and the frequency to be used in the
immediately following hop
„ Any two nodes from two disconnected networks have at least
two overlapping time period of length µs on the frequency f0
(See Figure 6 18)
(See Figure 6.18)
J. P. Sheu
Ifμis the length of each slot and μs is the length of the
μ g μs g
synchronization period on each slot, then the dwell time of f0 is
μ+ μs
Frame Period
f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0 f0 f1 f0
Node from
Subnet 1
Slot
f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0 f0 f1 f0 Subnet 1
f0 f5 f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0
Node from
Subnet 2
f0 synchronizing frequency
M = 5
Figure 6.18. Merging of subnets.
J. P. Sheu
HRMA (cont )
HRMA (cont.)
A d d t t it d t it th HR i d f
„ A node ready to transmit data, it senses the HR period of
the current slot
„ If the channel is idle during HR period, it transmits an RTS during
g p , g
RTS period and waits for CTS during CTS period
„ If the channel is busy during HR period, it backs off for a randomly
multiple slots
p
„ Suppose the sender needs to transmits data across multiple
frames, it informs the receiver through the header of the
d k
data packet
„ The receiver node transmits an HR packet during the HR period of
the same slot in next frame to informs its neighbors
g
„ The sender receiving the HR packet, it sends an RTS during the
RTS period and jams other RTS packets
„ Both the sender and receiver remain silent during the CTS period
J. P. Sheu
„ Both the sender and receiver remain silent during the CTS period
FPRP: Five-Phase Reservation
P t l
Protocol
„ FPRP is a single-channel TDMA-based broadcast scheduling protocol:
„ need global time synchronization
„ fully distributed and scalable
„ fully distributed and scalable
„ reservation process is localized; it involves only two-hop neighbors
„ No hidden terminal problem
i i di id d i f i f ( ) d i f i
„ Time is divided into frames: reservation frame (RF) and information
frame (IF) (see Figure 6.21)
„ Each RF has N reservation slots (RS) and each IF has N information slots (IS)
( ) ( )
„ Each RS is composed of M reservation cycles (RCs)
„ With each RC, a five-phase dialog takes place
C di t IS h d ld b i f th f ll i th
„ Corresponding to IS, each node would be in one of the following three
states: transmit (T), receive (R), and blocked (B)
J. P. Sheu
RF IF IF IF …….. IF IF RF IF IF IF …
RS1 RS2 RSN
IS1 IS2 . . . . ISN
RS1 RS2 . . . . RSN
RC1 RC2 . . . . RCM
RR CR RC RA P/E
Five-phase reservation dialog
Figure 6 21 Frame structure in FPRP
Figure 6.21. Frame structure in FPRP.
J. P. Sheu
FPRP: Five-Phase Reservation
P t l ( t )
Protocol (cont.)
„ Five-phase protocol:
„ Reservation request: send reservation request (RR) packet to dest.
C lli i t if lli i i d t t d b d th t d
„ Collision report: if a collision is detected by any node, that node
broadcasts a CR packet
„ Reservation confirmation: a source node won the contention will
send a RC packet to destination node if it does not receive any CR
message in the previous phase
„ Reservation acknowledgment: destination node acknowledge
„ Reservation acknowledgment: destination node acknowledge
reception of RC by sending back RA message to source
„ Packing and elimination: use packing packet and elimination packet
„ An example is shown in Figure 6.22
J. P. Sheu
7
8
4
2
8
5
2
1
11
6
1
9
3
10
RR Packet RC Packet
RA Packet
CR Packet
Figure 6.22. FPRP - Example.
J. P. Sheu
MACA/PR: MACA with Piggy-
B k d R ti
Backed Reservation
„ MACA/PR is used to provide real time traffic support
„ The main components: a MAC protocol (MACAW
+ non persistent CSMA), a reservation protocol, and
a QoS routing protocol
„ Each node maintains a reservation table (RT) that
records all the reserved transmit and receive
l / i d f ll d
slots/windows of all nodes
„ Non-real time packet: wait for a free slot in the RT +
d i Æ Æ Æ Æ
random time Æ RTS Æ CTS Æ DATA Æ ACK
J. P. Sheu
MACA/PR: MACA with Piggy-
Backed Reservation (cont )
Backed Reservation (cont.)
„ Real time packet:
„ Real time packet:
„ Transmit real time packets at certain regular intervals
(say CYCLE)
(say CYCLE)
„ RTSÆCTSÆDATA (carry reservation info for next
data) Æ ACKÆ…ÆDATA (carry reservation info)
data) Æ ACKÆ…ÆDATA (carry reservation info)
Æ ACK
„ Hear DATA and ACK: update their reservation table
„ The ACK packet serves to renew the reservation, in
addition to recovering from the packet loss
„ Reservation fail: fail to receive ACK packets for a certain
number of DATA packets
J. P. Sheu
MACA/PR: MACA with Piggy-
Backed Reservation (cont )
Backed Reservation (cont.)
„ For maintaining consistent information regarding free slots
„ Periodic exchange of reservation tables
„ Best effort and real time packet transmissions can be interleaved
p
at nodes
„ When a new node joins: receive reservation tables from each of
its neighbors and learns about the reservations made in the
its neighbors and learns about the reservations made in the
network
„ QoS Routing protocol: DSDV (destination sequenced distance
vector)
vector)
„ MACA/PR does not require global synchronization among
nodes
„ Drawback: possibility of many fragmented free slots not being
„ Drawback: possibility of many fragmented free slots not being
used at all
J. P. Sheu
NAV for Sender
Sender
CYCLE CYCLE CYCLE
Sender
Receiver
NAV for Receiver
RTS
CTS
DATA
ACK
Reserved Slot
Free Slot
CTS ACK Free Slot
Figure 6.23. Packet transmission in MACA / PR.
J. P. Sheu
RTMAC: Real Time Medium Access
Control Protocol
Control Protocol
Th MAC l d Q S i l
„ The two components: MAC protocol and QoS routing protocol
„ QoS routing: for end to end reservation + release of bandwidth
„ MAC: medium access for best effort + reservation for real time
„ MAC: medium access for best effort + reservation for real time
„ Control packets
„ Real time : ResvRTS, ResvCTS, and ResvACK, half of DIFS
„ Best effort: RTS, CTS, and ACK
„ The duration of each resv-slot is twice the maximum
propagation delay
p p g y
„ Transmit real time packets first reserves a set of resv-slots
„ The set of resv-slots for a connection is called a connection-slot
The superframe for each node may not strictly align with the
„ The superframe for each node may not strictly align with the
other nodes (use relative time for all reservation)
J. P. Sheu
NAV for Sender
Superframe Superframe Superframe
Sender
Receiver
NAV for Receiver
Superframe Superframe Superframe
ResvRTS Real-time Data
R l i ACK
Reserved Slot
Old Reservation of Node A
ResvCTS
ResvACK
Real-time ACK
Reserved Slot
Free Slot
Figure 6.24. Reservation mechanism in RTMAC.
Old Reservation of Node B
J. P. Sheu
C t ti B d MAC P t l
Contention-Based MAC Protocols
with Scheduling Mechanisms
with Scheduling Mechanisms
DPS: Distributed Priority Scheduling
d MAC i Ad H N t k
and MAC in Ad Hoc Networks
P id diff i d Q S l l diff i l
„ Provide differentiated QoS levels to different wireless
applications in ad hoc networks
A hi bl b Q S iti MAC d t k l
„ Achievable by QoS-sensitive MAC and network layer
scheduling
Di t ib t d h d li bl ith l l i f ti
„ Distributed scheduling problem with local information
„ Basic mechanisms:
Pi b k i f ti
„ Piggyback information
„ Head-of-line (HoL) packet as the packet with the highest priority
(lowest index)
(lowest index)
„ RTS, CTS : carry current packet info
„ DATA, ACK: carry next head-of-line info
J. P. Sheu
Source
(Node 1) RTS CTS DATA ACK
( )
Destination
(Node 2) RTS CTS DATA ACK
Neighbor Node
S D P
S D P
Neighbor Node
(Node 4)
NAV
S D P
4 5 1
7 8 5
4 5 1
7 8 5
1 2 9
S D P
4 5 1
7 8 5
1 2 9
S D P
4 5 1
7 8 5
1 6 14
1 6 14
1 2 9
ST (a) ST (d)
ST (c)
ST (b)
Scheduling Table Updates at Neighbor Node 4
S – Source Id D – Destination Id P – Priority Index
Piggy backed priority information
Piggy-backed priority information
Figure 6.25. Piggy-backing and scheduling table update mechanism in DPS.
J. P. Sheu
Distributed Wireless Ordering
Protocol (DWOP)
Protocol (DWOP)
„ DWOP based on the DSP, ensure that packet access the
medium according to the order specified by an ideal
f h d l h FIFO
reference schedule such as FIFO
„ Each node builds up a scheduling table (ST) ordered
di t th h d i l ti
according to the overheard arrival times
„ A node is made eligible to contend for the channel only if
its locally queued packet has a smaller arrival time
its locally queued packet has a smaller arrival time
compared to all other arrival times in its ST
„ Scheduling problems: Information asymmetry and
„ Scheduling problems: Information asymmetry and
Perceived collisions
J. P. Sheu
Distributed Wireless Ordering
P t l (DWOP)
Protocol (DWOP)
„ Information asymmetry: a transmitting node might not be
„ Information asymmetry: a transmitting node might not be
aware of the arrival times of packets queued at another
node which is not within its transmission range
g
„ Solution: a receiver find that the sender is transmitting out of
order, an out-of-order notification is piggy-backed by the receiver
on the control packet (CTS/ACK)
on the control packet (CTS/ACK)
„ Perceived collisions: the ACK packet collides at the node,
the corresponding entry in the ST will never be removed
the corresponding entry in the ST will never be removed
„ Solution: when a node observes that its rank remains fixed while
packets whose PR are below the priority of its packet are being
transmitted, it deletes the oldest entry from its ST
J. P. Sheu
2
1
3
B
A 2
1
3
4
B
A
6
5
C
4
4
Coverage region of flow A Coverage region of flow A
(a) (b)
Coverage region of flow B Coverage region of flow C
Figure 6.26 (a) Information asymmetry. (b) Perceived collisions.
J. P. Sheu
MAC Protocols with Directional
Antennas
Antennas
MAC Protocol Using Directional
Antennas
Antennas
„ Advantages
„ Advantages
„ Reduced signal interference, increase system throughput, and
improved channel reuse
A i
„ Assumptions
„ Only one radio transceiver can transmit and receive only one
packet at any given time
p y g
„ M directional antennas, each antennas having a conical
radiation pattern, spanning an angle of 2π/M radians (See
Figure 6.28)
g )
„ Adjacent antennas never overlap
„ If a node transmits when all its antennas are active, then the
transmission’s radiation pattern is similar to that of an omni-
transmission s radiation pattern is similar to that of an omni-
directional antennas
„ Packet transmission--See Figure 6.29
J. P. Sheu
Radiation Pattern
for Antenna 5
for Antenna 5
Radiation Pattern
for Antenna 4
Radiation Pattern
for Antenna 6
Radiation Pattern
for Antenna 6
Radiation Pattern
for Antenna 3
Radiation Pattern
for Antenna 1
Radiation Pattern
for Antenna 2
Node with 6 antennas (M = 6)
Fi 6 28 R di i f di i l
Figure 6.28. Radiation patterns of directional antennas.
J. P. Sheu
RTS
S N d
RTS
RTS
Source Node
RTS
RTS
DATA
CTS
CTS
CTS
RTS Destination Node
CTS
CTS CTS
CTS
Figure 6.29. Packet transmission.
J. P. Sheu
DBTMA: Directional Busy Tone-
Based MAC Protocol
Based MAC Protocol
„ Adapt the DBTMA protocol for use with directional
„ Adapt the DBTMA protocol for use with directional
antennas.
„ Directional Antenna
„ N antenna elements, a sector = 360/N
„ Unicast: only a single antenna element
B d t ll th t l t
„ Broadcast: all the antenna elements
„ Protocol: a) sender transmits RTS in all directions, b)
receiver sends back CTS to the sender with the direction
of maximum power and turns on the BTr in the direction
to the sender, c) sender turns on the BTt in the direction of
receiver and transmits data packet (See Figure 6.30 b)
p ( g )
„ This protocol is not guaranteed to be collision free (see
Fig. 6.31 b)
J. P. Sheu
B
Directional BTt
of Node A
C
A
D
B
C
A
B
D
D
Active session
Request for transmission
Directional transmission
From Node C to Node D
Omnidirectional BTt of Node A
(a) (b)
(a) (b)
Figure 6.30. Directional DBTMA: Example 1.
J. P. Sheu
Directional BTr
B
A
A
r
of Node B
B
C
B
Directional transmission
From Node C to Node D
C X
D
A i i
D
From Node C to Node D
Active session
Omnidirectional BTr of Node B
(a) (b)
Figure 6.31. Directional DBTMA: Example 2.
J. P. Sheu
Directional MAC Protocols for Ad
Hoc Wireless Networks
Hoc Wireless Networks
„ D MAC: assume each node knows about the location of neighbors
„ D-MAC: assume each node knows about the location of neighbors
„ In the first directional MAC scheme (DMAC-1)
„ Directional RTS (DRTS)Æ omni-directional CTS (OCTS)Æ
Directional DATA (DDATA)Æ Directional ACK(DACK)
Directional DATA (DDATA)Æ Directional ACK(DACK)
„ May increase the probability of control packet collisions
„ See Figure 6.32 (if node E send a packet to node A, it will collide the
OCTS or DACK)
OCTS or DACK)
„ In the second directional MAC scheme (DMAC-2)
„ Both the directional RTS (DRTS) and omni-directional RTS (ORTS)
transmissions are used
transmissions are used
„ Reduced control packet collisions
„ Rules for using DRTS and ORTS:
ORTS f th di ti l t bl k d
„ ORTS: none of the directional antennas are blocked
„ DRTS : otherwise
„ Another packet called directional wait-to-send (DWTS) is used in this
scheme (See Fig re 6 33)
J. P. Sheu
scheme (See Figure 6.33)
DRTS DRTS
E
OCTS
DATA
OCTS OCTS
DATA
A B D
C
ACK
DATA
ACK
Transmission Range of the Node
Control/Data Packet
Data session
Data session
Non-permissible session
Figure 6.32. Operation of DMAC protocol.
J. P. Sheu
DRTS
A B C D
OCTS
DATA
OCTS ORTS
DWTS
ACK
Control/Data Packet
Transmission Range of the Node
Control/Data Packet
Data session
Non-Permissible Session
Figure 6.33. Operation of DMAC protocol.
J. P. Sheu
Other MAC Protocols
O e C o oco s
MMAC: Multi-Channel MAC
P t l
Protocol
A ti
„ Assumptions:
„ No dedicated control channel
„ N channels for data transmission
„ Each node maintains a data structure called PreferableChannelList (PCL)
„ Three types for channels:
„ High preference channel (HIGH): the channel is selected by the current
node and is used by the node
„ Medium preference channel (MID): a channel which is free and is not
p ( )
being currently used
„ Low preference channel (LOW): such a channel is already being used in
the transmission range of the node by other neighboring nodes
g y g g
J. P. Sheu
MMAC: Multi-Channel MAC
P t l ( t )
Protocol (cont.)
Ti i di id d i b i l d d i
„ Time is divided into beacon intervals and every node is
synchronized by periodic beacon transmissions
Ad hoc traffic indication messages (ATIM) window is
„ Ad hoc traffic indication messages (ATIM) window is
used to negotiate for channels for transmission
„ ATIM, ATIM-ACK, and ATIM-RES (ATIM-reservation)
„ ATIM, ATIM ACK, and ATIM RES (ATIM reservation)
message
„ ATIM messages takes place on a particular channel (default
h l)
channel)
„ Operation of the MMAC protocol is illustrated in Figure
6 34
6.34
„ The receiver plays a dominant role in channel selection
J. P. Sheu
ATIM Window
ATIM Window
A ATIM DATA
ATIM window
B
ATIM ACK ACK
ATIM window
ATIM i d
C
ATIM-ACK ACK ATIM window
ATIM window
Dozing
ATIM window
Beacon interval
Power saving mechanism for DCF: Node A announces a buffered frame for B using an ATIM
frame. Node B replies by sending an ATIM-ACK, and both A and B stay awake during the entire
Chih-Yung Chang 77
beacon interval. The actual data transmission from A to B is completed during the beacon interval.
Since C does not have any frame to send or receive, it dozes after the ATIM window.
S1 R1 S2
R2
ATIM
ATIM
ATIM-ACK(1) ATIM-ACK(1)
ATIM RES(1)
ATIM
ATIM ACK(2)
ATIM
Window
ATIM-RES(1) ATIM-ACK(2)
ATIM-RES(2)
Window
RTS RTS
Beacon
I l
CTS
DATA
CTS
DATA
Interval
ACK
On Channel 1
.
ACK
On Channel 2
.
.
.
.
.
.
.
.
Start of Next
ATIM Window
Figure 6.34. Operation of MMAC protocol.
J. P. Sheu
MMAC: Multi-Channel MAC
Protocol (cont )
Protocol (cont.)
„ Channel selection mechanism:
„ If a HIGH state channel exists in node R’s PCL then that channel is
l d
selected
„ Else if there exists a HIGH state channel in the PCL of node S then this
channel is selected
„ Else if there exists a common MID state channel in the PCLs of both
node S and node R then that channel is selected
El if h i MID l f h d h h
„ Else if there exists a MID state at only one of the two nodes then that
channel is selected
„ if all channels in both PCLs are in LOW state the channel with the least
count is selected
J. P. Sheu
MCSMA: Multi-Channel CSMA
MAC P t l
MAC Protocol
„ Select an idle channel randomly and employ the notion of soft channel
„ Select an idle channel randomly and employ the notion of soft channel
reservation
„ Assumptions
„ N channel: bandwidth = W/N W is the total bandwidth for
„ N channel: bandwidth = W/N, W is the total bandwidth for
communication
„ An idle node (which is not transmitting packets) continuously monitors all
the N channels
the N channels
„ Idle state: total received signal strength (TRSS) < sensing threshold (ST)
„ Maintain a free-channels list
„ Channel selection protocol:
„ Channel selection protocol:
„ if free-channels list is empty then wait for long inter-frame space time
(LIFS) + back-off period
„ if the channel remains idle start transmitting on this channel
„ if the channel remains idle start transmitting on this channel
„ if free-channels list is non-empty then first checks whether the channel it
used for its most recent successful transmission in the list
„ then use this channel for its new transmission else in the free channels is
J. P. Sheu
„ then use this channel for its new transmission else in the free-channels is
randomly chosen
MCSMA: Multi-Channel CSMA
MAC Protocol (cont )
MAC Protocol (cont.)
„ Before the actual packet transmission
„ if TRSS of the chosen channel < ST for at least LIFS period initiate
packet transmission
p
„ otherwise initiate back-off delay after the LIFS time period
„ During the back-off period, if (TRSS of the chosen channel > ST)
back off is immediately canceled
back-off is immediately canceled
„ A new back- off delay is scheduled when the TRSS again goes below
ST
„ After successfully transmitting a packet, the sender node
notes the ID of the channel used and this channel would be
given preference for its next transmission
given preference for its next transmission
„ When the number of channel is sufficiently large, each node
tends to reserve a channel for itself
J. P. Sheu
PCM: Power Control MAC
Protocol for Ad Hoc Networks
Protocol for Ad Hoc Networks
Th PCM ll d t th i t i i l l
„ The PCM allows nodes to vary their transmission power levels on a
per-packet basis
„ BASIC scheme
„ RTS and CTS are transmitted with maximum power pmax
„ The RTS is received at the receiver with signal level pr
„ the receiver calculate the desired power level pdesired based on
the received power level pr, the transmitted power level pmax,
and the noise level at receiver
„ In the second method, when the source receives the CTS (in
maximum power) packet, it calculates pdesired as follows:
( / ) R h R i th i i
pdesired = ( pmax/ pr) x Rxthresh x c, where Rxthresh is the minimum
necessary received signal strength and c is the constant
„ Drawbacks: May the probability of collision (see Figure 6.35)
J. P. Sheu
Carrier-Sensing Zone
Carrier-Sensing Zone
For CTS
RTS
X
g
For RTS
For CTS
A B
RTS
CTS
DATA
Transmission Range
for RTS
Transmission Range
for CTS
DATA
ACK
Transmission
Range for DATA
Transmission Range
for ACK
Y
Y
Figure 6.35. Packet transmission in BASIC scheme.
J. P. Sheu
PCM: Power Control MAC
Protocol for Ad Hoc Networks
Protocol for Ad Hoc Networks
„ Solution:
„ RTS and CTS are transmitted with maximum power pmax
p pmax
„ Carrier-sensing zone: the received signal is not high
enough to decode it correctly
g y
„ Transmit the DATA packet at maximum power level pmax
periodically
p y
„ The duration of each such transmission must larger
than the time required for physical carrier sensing (see
than the time required for physical carrier sensing (see
Figure 6.36)
J. P. Sheu
EIFS
Pmax
Pdesired
0
RTS CTS DATA ACK
SIFS
Fi 6 36 T i i tt i PCM
Figure 6.36 . Transmission power pattern in PCM.
J. P. Sheu
RBAR: Receiver-Based Autorate
Protocol
Protocol
„ Rate Adaptation Mechanism
„ run at the receiver instead of being located at the sender
consist of channel quality estimation and rate selection
„ consist of channel quality estimation and rate selection
„ Rate selection is done during RTS-CTS packet exchange
„ The RTS and CTS packets carry the chosen modulation rate
„ The RTS and CTS packets carry the chosen modulation rate
and the size of the data packet, instead of the duration of the
reservation (see Figure 6.37)
„ The rate chosen by the sender and receiver are different
„ DRTS calculated by the neighbor nodes of the sender would not be valid
if the rates chosen by the sender and receiver are different
if the rates chosen by the sender and receiver are different
„ Overcome problem: a special MAC header containing a reservation
subheader (RSH) which contains control information for determining
the transmission duration
J. P. Sheu
the transmission duration
RSH
RTS
J. P. Sheu
RBAR: Receiver-Based Auto-rate
Protocol (cont )
Protocol (cont.)
„ Channel quality estimation
„ The receiver uses a sample of the instantaneous received signal
strength at the end of RTS reception
strength at the end of RTS reception
„ Rate selection algorithm
„ A simple threshold based technique is used e g signal to noise
„ A simple threshold based technique is used e.g. signal to noise
ratio (SNR)
„ It is important that the best available channel quality
estimates are used for rate selection
J. P. Sheu
ICSMA: Interleaved Carrier-Sense
Multiple Access Protocol
Multiple Access Protocol
„ Efficiently overcomes the exposed terminal problem (see Figure 6.38)
„ Node C is called a send-exposed node, and node E is called a
receiver-exposed node
receiver exposed node
„ The total available bandwidth is split into two equal channels (say,
channel 1 and channel 2)
„ The handshaking process is interleaved between the two channels
„ Sender uses a channel (channel 1 ) to send RTS and DATA while
receiver uses another channel (channel 2) to send CTS and ACK
receiver uses another channel (channel 2) to send CTS and ACK
„ A node hear RTS in a particular channel and do not hear CTS on the
other channel, it can send RTS in the same channel
„ A node hear CTS in a particular channel and do not hear RTS on the
other channel, it can send CTS in the same channel
J. P. Sheu
A B
C E
F
D
Data session
Non-permissible session
J. P. Sheu
ICSMA: Interleaved Carrier-Sense
M lti l A P t l ( t )
Multiple Access Protocol (cont.)
„ Each node maintains a structure called extended network allocation
vector (E-NAV)
„ Two linked lists of blocks (SEList and REList):
„ Two linked lists of blocks (SEList and REList):
„ List looks like s1, f1; s2, f2;. . .; sk, fk, where si denotes start time of
the i-th block list and fi denotes finish time of the i-th block
„ SEList : the node would be sender-exposed in the future such that
sj < t < fj
„ REList : the node would be receiver exposed in the future such
„ REList : the node would be receiver-exposed in the future such
that sj < t < fj
„ Both lists are updated when RTS and CTS packets are received
by the node
„ See Figure 6.39
J. P. Sheu
RTS DATA
Sender
CTS ACK
Receiver
Figure 6.39. (a) Packet transmissions in 802.11 DCF
J. P. Sheu
J. P. Sheu
Summary
Summary
„ We have discussed the characteristics and operating
principles of several MAC schemes
„ Several International standards exists for MANETs, such
as IEEE 802.11a, b, and g
„ New Standards are still be developed such as UWB, IEEE
802.16 (WiMax)
F t di ti d t h
„ Future directions and current research:
„ Hidden/exposed terminal problem
„ Interference limited model
„ Interference limited model
„ Energy conservation
„ Single channel v.s. Multiple channels
J. P. Sheu
Summary (cont )
Summary (cont.)
„ Multi-hop networks
„ Fairness among competing nodes
Fairness among competing nodes
„ Directional antennas
„ QoS issues
J. P. Sheu
Exercises
Exercises
„ 1, 4, 5, 10, 14, 15
J. P. Sheu

More Related Content

What's hot

CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHAREKhushboo Pal
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)sonangrai
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access MethodsPrateek Soni
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networksBeginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks3G4G
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Data link layer
Data link layerData link layer
Data link layerst2112
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocolSTEFFY D
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)Netwax Lab
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 

What's hot (20)

CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Lte physical layer overview
Lte physical layer overviewLte physical layer overview
Lte physical layer overview
 
HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
Transport layer
Transport layerTransport layer
Transport layer
 
Multiple Access Methods
Multiple Access MethodsMultiple Access Methods
Multiple Access Methods
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
GO BACK N PROTOCOL
GO BACK N PROTOCOLGO BACK N PROTOCOL
GO BACK N PROTOCOL
 
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networksBeginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Data link layer
Data link layerData link layer
Data link layer
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 

Similar to wn_Chapter_6_MAC.pdf

wn_Chapter_6_MAC.pptx
wn_Chapter_6_MAC.pptxwn_Chapter_6_MAC.pptx
wn_Chapter_6_MAC.pptxssuser967948
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis Defense
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis DefenseVHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis Defense
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis DefenseAlp Sayin
 
Chien-Cheng Lai_Research Project
Chien-Cheng Lai_Research ProjectChien-Cheng Lai_Research Project
Chien-Cheng Lai_Research ProjectJames Lai
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)NYversity
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link controlVishal kakade
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismsupriyaharlapur1
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)NYversity
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.pptSwatiRani13
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Voice Over U M T S Evolution From W C D M A, H S P A To L T E
Voice Over  U M T S Evolution From  W C D M A, H S P A To  L T EVoice Over  U M T S Evolution From  W C D M A, H S P A To  L T E
Voice Over U M T S Evolution From W C D M A, H S P A To L T EPengpeng Song
 

Similar to wn_Chapter_6_MAC.pdf (20)

wn_Chapter_6_MAC.pptx
wn_Chapter_6_MAC.pptxwn_Chapter_6_MAC.pptx
wn_Chapter_6_MAC.pptx
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 
Chapter 6 MAC.pdf
Chapter 6 MAC.pdfChapter 6 MAC.pdf
Chapter 6 MAC.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 
Topic5
Topic5Topic5
Topic5
 
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis Defense
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis DefenseVHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis Defense
VHF/UHF Uplink Solutions for Remote Wireless Sensor Networks - Thesis Defense
 
Chien-Cheng Lai_Research Project
Chien-Cheng Lai_Research ProjectChien-Cheng Lai_Research Project
Chien-Cheng Lai_Research Project
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Computer network (16)
Computer network (16)Computer network (16)
Computer network (16)
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)
 
Chap-13.ppt
Chap-13.pptChap-13.ppt
Chap-13.ppt
 
TransportLayerServices.ppt
TransportLayerServices.pptTransportLayerServices.ppt
TransportLayerServices.ppt
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Voice Over U M T S Evolution From W C D M A, H S P A To L T E
Voice Over  U M T S Evolution From  W C D M A, H S P A To  L T EVoice Over  U M T S Evolution From  W C D M A, H S P A To  L T E
Voice Over U M T S Evolution From W C D M A, H S P A To L T E
 
Hsdpa analysis
Hsdpa analysisHsdpa analysis
Hsdpa analysis
 
Ieee 802.11.n
Ieee 802.11.nIeee 802.11.n
Ieee 802.11.n
 

Recently uploaded

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 

wn_Chapter_6_MAC.pdf

  • 1. Chapter 6: MAC Protocols for Ad Chapter 6: MAC Protocols for Ad Hoc Wireless Networks Jang Ping Sheu Jang Ping Sheu
  • 2. Outline Outline „ Issues in designing a MAC protocol „ Contention-based protocols „ Contention-based protocols with reservation mechanisms „ Contention-based protocols with scheduling p g mechanisms „ Other protocols „ Other protocols „ Summary J. P. Sheu
  • 3. Issues in Designing a MAC Protocol Issues in Designing a MAC Protocol „ Bandwidth Efficiency „ QoS support „ Synchronization „ Hidden and Exposed Terminal Problems „ Error-Prone Share Broadcast Channel „ Error-Prone Share Broadcast Channel „ Distributed Nature/Lack of Central Coordination Coordination „ Mobility of Nodes J. P. Sheu
  • 4. S2 R1 S1 S3 R2 T i i f N d S1 Transmission range of Node S2 Packet transmission Transmission range of Node S1 Packet transmission Transmission that is not permitted Figure 6.1 Hidden and exposed terminal problems J. P. Sheu
  • 5. Design Goals of a MAC Protocol es g Goa s o a C otoco „ Provided QoS support for real-time traffic „ Low access delay „ Low access delay „ Bandwidth (BW) efficiently used F i ll ti f BW t d „ Fair allocation of BW to nodes „ Low control overhead „ Scalable to large networks „ Support power control and time synchronization „ Support power control and time synchronization „ Adaptive data rate control J. P. Sheu
  • 6. Classifications of MAC Protocols Classifications of MAC Protocols „ Contention-based protocols „ A node does not make any resource reservation a priori y p „ It cannot provide QoS guarantee „ Two types of random access yp „ Sender-initiated protocols „ Single-channel sender-initiated protocols „ Multi-channel sender-initiated protocols „ Receiver-initiated protocols J. P. Sheu
  • 7. Classifications of MAC Protocols ( t ) (cont.) „ Contention-based protocols with reservation mechanisms S l i ffi „ Support real-time traffic „ Reserve bandwidth a priori S h t l „ Synchronous protocols „ Global time synchronization is difficult to achieve „ Asynchronous protocols „ Asynchronous protocols „ Not require global synchronization „ Contention based protocols with scheduling „ Contention-based protocols with scheduling „ Packet scheduling at nodes and „ Scheduling nodes for access to the channel J. P. Sheu „ Scheduling nodes for access to the channel
  • 8. Figure 6 2: MAC protocols for ad hoc network Figure 6.2: MAC protocols for ad hoc network J. P. Sheu
  • 10. MACA Protocol MACA Protocol „ Multiple access collision avoidance protocol proposed by Karn in 1990 „ MACA does not make use of carrier-sensing „ Request-to-send (RTS) clear-to-send (CTS) „ Request to send (RTS), clear to send (CTS), DATA messages „ Use binary exponential back off (BEB) algorithm „ Use binary exponential back-off (BEB) algorithm for retry B th th RTS d CTS k t th „ Both the RTS and CTS packets carry the expected duration of the data packet transmission J. P. Sheu
  • 11. MACA Protocol (cont ) MACA Protocol (cont.) „ A node near the receiver (overcome hidden node problem) problem) „ Hearing the CTS packet, defers its transmission till the receiver receives the data packet till the receiver receives the data packet „ A node near the sender (overcome exposed node problem) problem) „ A node that only hears the RTS is free to transmit simultaneously when the sender is transmitting simultaneously when the sender is transmitting data J. P. Sheu
  • 12. Neighbor Sender Receiver Neighbor RTS RTS CTS CTS DATA DATA Figure 6.3 Packet transmission in MACA J. P. Sheu
  • 13. MACAW Protocol MACAW Protocol „ Back-off mechanism used in MACA starves flows (See Figure 6.4) ( g ) „ Back-off algorithm has been modified by Bharghavan in 1994 g „ Packet header has an additional filed carrying the current back-off counter value of the transmitting node „ A node receiving the packet copies this value into its own back-off counter J. P. Sheu
  • 14. R1 S1 S2 R1 S1 R2 × R2 Figure 6.4 Example topology J. P. Sheu
  • 15. MACAW Protocol (cont ) MACAW Protocol (cont.) „ To prevent large variations in the back-off values „ A multiplicative increase and linear decrease (MILD) is used in MACAW „ Collision: back-off is increased by a multiplicative f t (1 5) factor (1.5) „ Successful: back-off is decreased by one Implement per flow fairness as opposed to the per „ Implement per flow fairness as opposed to the per node fairness „ Multiple queues at every node (running back off „ Multiple queues at every node (running back-off algorithm independently) J. P. Sheu
  • 16. MACAW Protocol (cont ) MACAW Protocol (cont.) A l k ACK d i MACAW „ An extra control packet ACK used in MACAW „ If ACK is not received by sender, the sender would b i i RTS f h k retry by transmitting an RTS for the same packet „ The back-off counter is incremented „ The receiver, instead sending back a CTS, sends an ACK for the packet received E d d bl ( Fi 6 5) „ Exposed node problem (see Figure 6.5) „ Before transmitting the data packet, the source node t it th d t di (DS) k t t RTS transmits the data-sending (DS) packet to ensure RTS- CTS exchange successful J. P. Sheu
  • 17. R1 S1 R2 S2 Figure 6.5 Example topology S2 R2 S1 R1 RRTS RRTS Figure 6.6 Example topology. J. P. Sheu
  • 18. MACAW Protocol (cont ) MACAW Protocol (cont.) „ Another control packet: request for request to send (RRTS), See Figure 6.6 S h i i i f i d b d „ Synchronization information needs to be propagated to the concerned nodes „ If a node had received an RTS previously for which it „ If a node had received an RTS previously for which it was not able to respond because there exists on-going transmission, then it waits for the next contention i d d i period and transmits RRTS „ Figure 6.7 shows the operation of the MACAW t l protocol „ RTS-CTS-DS-DATA-ACK J. P. Sheu
  • 19. N1 S R N2 RTS RTS CTS CTS CTS CTS DS DS DATA DATA ACK ACK Figure 6 7 Packet exchange in MACAW Figure 6.7 Packet exchange in MACAW. J. P. Sheu
  • 20. FAMA: Floor Acquisition Multiple Access Protocols „ Channel access consists of a carrier-sensing operation and a collision avoidance „ Carrier-sensing by the sender, followed by the RTS-CTS control packet exchange. D i i b lli i f h d i f „ Data transmission to be collision free, the duration of an RTS must be at least twice the maximum channel propagation delay p opagat o de ay „ Two FAMA protocol variants „ RTS-CTS exchange with no carrier sensing (MACA) „ RTS CTS exchange with no carrier sensing (MACA) „ RTS-CTS exchange with non-persistent carrier sensing (FAMA-NTR) J. P. Sheu
  • 21. FAMA-NTR FAMA-NTR B f di k h d h h l „ Before sending a packet, the sender senses the channel „ If channel is busy, the sender back-off a random time and t i l t retries later „ If the channel is free, the sender sends RTS and waits for a CTS packet a CTS packet „ If the sender cannot receive a CTS, it takes a random back-off and retries later back off and retries later „ If the sender receives a CTS, it can start transmission data packet p „ In order to allow the sender to send a burst of packets, the receiver is made to wait a time duration τ seconds after a J. P. Sheu packet is received
  • 22. BTMA: Busy Tone Multiple Access P t l Protocols Th i i h l i li i „ The transmission channel is split into: „ Data packet transmissions: a data channel „ Busy tone signal: a control channel „ Busy tone signal: a control channel „ When a node is ready for transmission, it senses the channel to check whether the busy tone is active to check whether the busy tone is active „ If not, it turns on busy tone signal and starts data transmission „ Otherwise, it reschedules the packet for transmission after some random rescheduling delay. „ When a node is transmitting, no other node in the two-hop i hb h d f th t itti d i itt d t neighborhood of the transmitting node is permitted to simultaneously transmit (See Figure 6.8) J. P. Sheu
  • 23. N1 Both nodes N1 and N2 transmit the busy tone. N2 Transmission range of Node N1 Transmission range of Node N2 Region in which simultaneous transmission are not possible when N1 is transmission data Transmission range of Node N1 Busy tone Figure 6.8 Transmission in BTMA. J. P. Sheu
  • 24. DBTMA: Dual Busy Tone Multiple Access Protocol Access Protocol „ The transmission channel is divided into: „ The data channel Æ data packet transmission „ The control channel Æ RTS, CTS, busy tones „ Use two busy tones on the control channel, BTt and BTr. y , t r „ BTt : indicate that it is transmitting on the data channel „ BT : indicate that it is receiving on the data channel „ BTr: indicate that it is receiving on the data channel „ Two busy tone signals are two sine waves at different frequencies q J. P. Sheu
  • 25. DBTMA: Dual Busy Tone Multiple Access Protocol (cont ) Access Protocol (cont.) Wh d i d t t it d t k t (S „ When a node is ready to transmit a data packet (See Figure 6.9) Fi t th h l t d t i h th th BT i l i ti „ First sense the channel to determine whether the BTr signal is active „ No BTr signalÆ transmit RTS packet „ On receiving the RTS packets, checks whether the BTt tone is active On receiving the RTS packets, checks whether the BTt tone is active „ No BTt signalÆ Sending CTS packet and turn on the BTr signal „ Sender: receive CTS Æ turn on BTt signal Æ start data Æ turn off BTt signal „ Receiver: receive data Æ turn off BTr signal DBTMA h b tt t k tili ti th RTS/CTS „ DBTMA has better network utilization than RTS/CTS based protocol (why?) J. P. Sheu
  • 26. RTS CTS BTt Control Channel DATA Data Channel Sender RTS CTS BTr Control Channel Receiver DATA Data Channel Receiver Figure 6.9 Packet transmission in DBTMA. J. P. Sheu
  • 27. RI-BTMA: Receiver-Initiated Busy Tone Multiple Access Protocol Tone Multiple Access Protocol The a ailable band idth is di ided into t o „ The available bandwidth is divided into two slotted channels: Th d t h l Æ d t k t t i i „ The data channel Æ data packet transmission „ Only if it finds the busy tone to be absent on the control channel control channel „ The control channelÆ busy tone signal D t k t bl d th t l d t k t „ Data packet: a preamble and the actual data packet „ The busy tone serves two purposes: „ Ack the sender the successful of receiving preamble „ Inform the nearby hidden nodes the impending J. P. Sheu transmission
  • 28. RI-BTMA: Receiver-Initiated Busy T M lti l A P t l ( ) Tone Multiple Access Protocol (cont.) „ The operation of the RI BTMA protocol (See Figure 6 10) „ The operation of the RI-BTMA protocol (See Figure 6.10) „ Two types the basic protocol „ the basic protocol „ No backlog buffers Æ packets that suffer collisions cannot be retransmitted „ the controlled protocol „ Backlogged mode Æ backlog buffer is non-empty „ Backlog buffers: transmitting a backlogged packet in the next idle slot with a probability q (why?) Non backlogged mode Æ transmitting a non backlogged packet „ Non-backlogged mode Æ transmitting a non-backlogged packet in the next idle slot with a probability p (why?) J. P. Sheu
  • 29. Control Channel Busy Tone DATA Data Channel Sender P Control Channel R i Busy Tone DATA Data Channel Receiver P Figure 6 10 Packet transmission in RI BTMA P Preamble Packet Figure 6.10 Packet transmission in RI-BTMA. J. P. Sheu
  • 30. MACA-BI: MACA-By Invitation MACA-BI: MACA-By Invitation „ MACA-BI is a receiver-initiated MAC protocol „ MACA-BI is a receiver-initiated MAC protocol „ Reduced the number of control packets in MACA protocol (uses three-way handshake mechanism) i d d i ( ) Æ d d b di „ Receiver sends ready to receive (RTR) Æ Sender responds by sending a DATA packet (See Figure 6.11) „ The receiver needs to estimate the average arrival rate of packets g p „ Problems: „ Receiver may not have an exact knowledge about the traffic rates „ The protocol allowing the sender to declare its backlog through the RTS control packet, if an RTR packet is not arrived within a given timeout „ Hidden terminal problem is overcome in MACA-BI „ However, the hidden terminal problem still affects the control packet transmission „ RTR packets can collide with DATA packets (See Figure 6.12) J. P. Sheu p p ( g )
  • 31. Sender Receiver Neighbor (hidden terminal with respect to sender) RTR RTR Blocked from DATA transmitting Figure 6 11 Packet transmission in MACA BI Figure 6.11 Packet transmission in MACA-BI PTR PTR PTR PTR S1 R1 A R2 S2 PTR1 PTR1 PTR2 PTR2 S1, S2 - Sender nodes , R1, R2 - Receiver nodes A - Neighbor node Figure 6.12 Hidden terminal problem in MACA-BI J. P. Sheu
  • 32. MARCH: Media Access with Reduced Handshake „ MARCH does not require any traffic prediction mechanism „ The RTS packet is used only for the first packet of the stream „ MACA: RTS Æ CTS Æ DATA Æ RTS Æ CTSÆ. . . „ MACA: RTS Æ CTS Æ DATA Æ RTS Æ CTSÆ. . . „ MARCH: RTS Æ CTS1 Æ DATA Æ CTS2 Æ DATA Æ… (See Figure 6.13) Th CTS k t MAC dd f th d i d th t „ The CTS packet: MAC address of the sender, receiver, and the route identification number (RTid) (See Figure 6.14) „ The RTid is used to avoid misinterpretation of CTS packets and initiation of false CTS-only handshake „ For example, when node Y received a CTS with RTid = route 1, it does not respond (See Fig 6 14) not respond (See Fig. 6.14) „ The throughput of MARCH is significantly high when compared to MACA, while the control overhead is much less J. P. Sheu
  • 33. A B C D RTS CTS CTS A B C D RTS CTS1 CTS1 DATA RTS tCSMA DATA 1 1 CTS CTS CSMA CTS2 DATA CTS CTS2 tMARCH DATA CTS RTS CTS3 DATA CTS DATA (a) (b) Figure 6.13 Handshake mechanism in (a) MACA and (b) MARCH J. P. Sheu
  • 34. X A B C D E Y Y Route 1: A-B-C-D Route 2: X-C-Y Fi 6 14 E l T l Figure 6.14 Example Topology J. P. Sheu
  • 35. Contention-Based Protocols with Reservation Mechanisms Reservation Mechanisms
  • 36. D-PRMA: Distributed Packet Reservation Multiple Access Protocol Reservation Multiple Access Protocol „ The channel is divided into fixed and equal sized frames „ The channel is divided into fixed and equal sized frames along the time axis. (See Figure 6.15) „ The RTS/BI and CTS/BI are used for slot reservation and for overcoming the hidden terminal problem „ If a terminal wins the contention through mini-slot 1, the t ( 1) i i l t f thi l t ill b t d t th extra (m – 1) mini-slots of this slot will be granted to the terminal as the payload „ For voice node, the same slot in each subsequent frame can be , q reserved until the end of its packet transmission „ In the other cases, the extra (m – 1) mini-slots are continuously used for contention and the winner of this continuously used for contention, and the winner of this contention will be granted the reservation of the same slot J. P. Sheu
  • 37. Frame Length Slot 2 Slot 1 ……………….. Slot s Mini-slot 1 Mini-slot 2 …………… Mini-slot m CTS/BI RTS/BI CTS/BI RTS/BI Figure 6.15 Frame structure in D-PRMA J. P. Sheu
  • 38. D-PRMA (cont ) D-PRMA (cont.) T i iti i t i l d t t i l „ To prioritize voice terminals over data terminals „ Voice terminals starts contenting from mini-slot 1 with probability p = 1 while data terminals can start such content with p < 1 „ Both voice and data terminals can content through the extra (m – 1) mini-slots with probability p < 1 „ Only the winner of a voice terminal can reserve the same slot in O y t e w e o a vo ce te a ca ese ve t e sa e s ot each subsequent frame until the end of packet transmission while the winner of a data terminal can only use one slot „ Problems: „ Problems: „ When a terminal wins the contention in mini-slot 1, how to prevent other terminals in the same slot for contention ? (Use RTS/CTS) „ How to prevent a terminal from contending for a reserved slot in each subsequent slot ? (Transmit a busy indication (BI) signal RTS/BI (receiver) (why?) and CTS/BI (sender) in mini-slot 1) J. P. Sheu
  • 39. CATA: Collision Avoidance Time All ti P t l Allocation Protocol S b d i d l i „ Support broadcast, unicast, and multicast transmissions simultaneously „ Each frame consists of S slots and each slot is further divided into five mini-slots „ CMS1: Slot Reservation (SR) „ CMS2: RTS „ CMS3: CTS „ CMS4: not to send (NTS) ( ) „ DMS: Data transmission J. P. Sheu
  • 40. CATA (cont ) CATA (cont.) „ Each node receives data during the DMS of current slot transmits an SR in CMS1 „ Every node that transmits data during the DMS of current „ Every node that transmits data during the DMS of current slot transmits an RTS in CMS2 „ CMS3 and CMS4 are used as follows: „ The sender of an intend reservation, if it senses the channel is idle in CMS1, transmits an RTS in CMS2 „ Then the receiver transmits a CTS in CMS3 „ Then the receiver transmits a CTS in CMS3 „ If the reservation was successful the data can transmit in current slot and the same slot in subsequent frames O h i f ll i h l b h h „ Once the reservation was successfully, in the next slot both the sender and receiver do not transmit anything during CMS3 and during CMS4 the sender transmits a NTS J. P. Sheu
  • 41. CATA (cont ) CATA (cont.) „ If a node receives an RTS for broadcast or multicast during CMS2 or it finds the channel to be free during CMS2 it remains idle during CMS3 and CMS4 CMS2, it remains idle during CMS3 and CMS4 „ Otherwise it sends a NTS packet during CMS4 A t ti l lti t b d t d th t „ A potential multicast or broadcast source node that receives the NTS packet or detecting noise during CMS4, understands that its reservation is failed understands that its reservation is failed „ If it find the channel is free in CMS4, which implies its reservation was successful „ CATA works well with simple single-channel half-duplex radios J. P. Sheu
  • 42. Frame Length Slot 1 Slot 2 . . . . . . . . . Slot S CMS 1 CMS 2 CMS 3 CMS 4 DMS Figure 6.16. Frame format in CATA. J. P. Sheu
  • 43. HRMA: Hop Reservation Multiple A P t l Access Protocol „ HRMA is a multi-channel MAC protocol, based on half- duplex very slow frequency hopping spread spectrum (FHSS) radios radios „ Each time slot is assigned a separate frequency channel (See Figure 6 17) Figure 6.17) „ Assumptions „ L: frequency channels „ L: frequency channels „ f0: dedicated synchronized channel frequency „ The remaining L - 1 frequencies are divided into ( 1) 2 L M − ⎢ ⎥ = ⎢ ⎥ ⎣ ⎦ frequency pairs denoted by 2 ⎣ ⎦ * ( , ), 1, 2 , 3, ...., i i f f i M = J. P. Sheu
  • 44. S h i i Frame Length Synchronizing Slot Slot 1 Slot 2 . . . . . . . Slot M SYN HR RTS CTS Figure 6 17 Frame format in HRMA Figure 6.17. Frame format in HRMA . J. P. Sheu
  • 45. HRMA (cont ) HRMA (cont.) „ Hop reservation (HR) RTS CTS DATA : f „ Hop reservation (HR), RTS, CTS, DATA : fi „ ACK: fi* „ All idle nodes hop to the synchronizing frequency f0 and d e odes op o e sy c o g eque cy f0 d exchange synchronization information „ Synchronizing slot: used to identify the beginning of a y g y g g frequency hop and the frequency to be used in the immediately following hop „ Any two nodes from two disconnected networks have at least two overlapping time period of length µs on the frequency f0 (See Figure 6 18) (See Figure 6.18) J. P. Sheu
  • 46. Ifμis the length of each slot and μs is the length of the μ g μs g synchronization period on each slot, then the dwell time of f0 is μ+ μs Frame Period f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0 f0 f1 f0 Node from Subnet 1 Slot f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0 f0 f1 f0 Subnet 1 f0 f5 f0 f0 f1 f0 f2 f0 f3 f0 f4 f0 f5 f0 Node from Subnet 2 f0 synchronizing frequency M = 5 Figure 6.18. Merging of subnets. J. P. Sheu
  • 47. HRMA (cont ) HRMA (cont.) A d d t t it d t it th HR i d f „ A node ready to transmit data, it senses the HR period of the current slot „ If the channel is idle during HR period, it transmits an RTS during g p , g RTS period and waits for CTS during CTS period „ If the channel is busy during HR period, it backs off for a randomly multiple slots p „ Suppose the sender needs to transmits data across multiple frames, it informs the receiver through the header of the d k data packet „ The receiver node transmits an HR packet during the HR period of the same slot in next frame to informs its neighbors g „ The sender receiving the HR packet, it sends an RTS during the RTS period and jams other RTS packets „ Both the sender and receiver remain silent during the CTS period J. P. Sheu „ Both the sender and receiver remain silent during the CTS period
  • 48. FPRP: Five-Phase Reservation P t l Protocol „ FPRP is a single-channel TDMA-based broadcast scheduling protocol: „ need global time synchronization „ fully distributed and scalable „ fully distributed and scalable „ reservation process is localized; it involves only two-hop neighbors „ No hidden terminal problem i i di id d i f i f ( ) d i f i „ Time is divided into frames: reservation frame (RF) and information frame (IF) (see Figure 6.21) „ Each RF has N reservation slots (RS) and each IF has N information slots (IS) ( ) ( ) „ Each RS is composed of M reservation cycles (RCs) „ With each RC, a five-phase dialog takes place C di t IS h d ld b i f th f ll i th „ Corresponding to IS, each node would be in one of the following three states: transmit (T), receive (R), and blocked (B) J. P. Sheu
  • 49. RF IF IF IF …….. IF IF RF IF IF IF … RS1 RS2 RSN IS1 IS2 . . . . ISN RS1 RS2 . . . . RSN RC1 RC2 . . . . RCM RR CR RC RA P/E Five-phase reservation dialog Figure 6 21 Frame structure in FPRP Figure 6.21. Frame structure in FPRP. J. P. Sheu
  • 50. FPRP: Five-Phase Reservation P t l ( t ) Protocol (cont.) „ Five-phase protocol: „ Reservation request: send reservation request (RR) packet to dest. C lli i t if lli i i d t t d b d th t d „ Collision report: if a collision is detected by any node, that node broadcasts a CR packet „ Reservation confirmation: a source node won the contention will send a RC packet to destination node if it does not receive any CR message in the previous phase „ Reservation acknowledgment: destination node acknowledge „ Reservation acknowledgment: destination node acknowledge reception of RC by sending back RA message to source „ Packing and elimination: use packing packet and elimination packet „ An example is shown in Figure 6.22 J. P. Sheu
  • 51. 7 8 4 2 8 5 2 1 11 6 1 9 3 10 RR Packet RC Packet RA Packet CR Packet Figure 6.22. FPRP - Example. J. P. Sheu
  • 52. MACA/PR: MACA with Piggy- B k d R ti Backed Reservation „ MACA/PR is used to provide real time traffic support „ The main components: a MAC protocol (MACAW + non persistent CSMA), a reservation protocol, and a QoS routing protocol „ Each node maintains a reservation table (RT) that records all the reserved transmit and receive l / i d f ll d slots/windows of all nodes „ Non-real time packet: wait for a free slot in the RT + d i Æ Æ Æ Æ random time Æ RTS Æ CTS Æ DATA Æ ACK J. P. Sheu
  • 53. MACA/PR: MACA with Piggy- Backed Reservation (cont ) Backed Reservation (cont.) „ Real time packet: „ Real time packet: „ Transmit real time packets at certain regular intervals (say CYCLE) (say CYCLE) „ RTSÆCTSÆDATA (carry reservation info for next data) Æ ACKÆ…ÆDATA (carry reservation info) data) Æ ACKÆ…ÆDATA (carry reservation info) Æ ACK „ Hear DATA and ACK: update their reservation table „ The ACK packet serves to renew the reservation, in addition to recovering from the packet loss „ Reservation fail: fail to receive ACK packets for a certain number of DATA packets J. P. Sheu
  • 54. MACA/PR: MACA with Piggy- Backed Reservation (cont ) Backed Reservation (cont.) „ For maintaining consistent information regarding free slots „ Periodic exchange of reservation tables „ Best effort and real time packet transmissions can be interleaved p at nodes „ When a new node joins: receive reservation tables from each of its neighbors and learns about the reservations made in the its neighbors and learns about the reservations made in the network „ QoS Routing protocol: DSDV (destination sequenced distance vector) vector) „ MACA/PR does not require global synchronization among nodes „ Drawback: possibility of many fragmented free slots not being „ Drawback: possibility of many fragmented free slots not being used at all J. P. Sheu
  • 55. NAV for Sender Sender CYCLE CYCLE CYCLE Sender Receiver NAV for Receiver RTS CTS DATA ACK Reserved Slot Free Slot CTS ACK Free Slot Figure 6.23. Packet transmission in MACA / PR. J. P. Sheu
  • 56. RTMAC: Real Time Medium Access Control Protocol Control Protocol Th MAC l d Q S i l „ The two components: MAC protocol and QoS routing protocol „ QoS routing: for end to end reservation + release of bandwidth „ MAC: medium access for best effort + reservation for real time „ MAC: medium access for best effort + reservation for real time „ Control packets „ Real time : ResvRTS, ResvCTS, and ResvACK, half of DIFS „ Best effort: RTS, CTS, and ACK „ The duration of each resv-slot is twice the maximum propagation delay p p g y „ Transmit real time packets first reserves a set of resv-slots „ The set of resv-slots for a connection is called a connection-slot The superframe for each node may not strictly align with the „ The superframe for each node may not strictly align with the other nodes (use relative time for all reservation) J. P. Sheu
  • 57. NAV for Sender Superframe Superframe Superframe Sender Receiver NAV for Receiver Superframe Superframe Superframe ResvRTS Real-time Data R l i ACK Reserved Slot Old Reservation of Node A ResvCTS ResvACK Real-time ACK Reserved Slot Free Slot Figure 6.24. Reservation mechanism in RTMAC. Old Reservation of Node B J. P. Sheu
  • 58. C t ti B d MAC P t l Contention-Based MAC Protocols with Scheduling Mechanisms with Scheduling Mechanisms
  • 59. DPS: Distributed Priority Scheduling d MAC i Ad H N t k and MAC in Ad Hoc Networks P id diff i d Q S l l diff i l „ Provide differentiated QoS levels to different wireless applications in ad hoc networks A hi bl b Q S iti MAC d t k l „ Achievable by QoS-sensitive MAC and network layer scheduling Di t ib t d h d li bl ith l l i f ti „ Distributed scheduling problem with local information „ Basic mechanisms: Pi b k i f ti „ Piggyback information „ Head-of-line (HoL) packet as the packet with the highest priority (lowest index) (lowest index) „ RTS, CTS : carry current packet info „ DATA, ACK: carry next head-of-line info J. P. Sheu
  • 60. Source (Node 1) RTS CTS DATA ACK ( ) Destination (Node 2) RTS CTS DATA ACK Neighbor Node S D P S D P Neighbor Node (Node 4) NAV S D P 4 5 1 7 8 5 4 5 1 7 8 5 1 2 9 S D P 4 5 1 7 8 5 1 2 9 S D P 4 5 1 7 8 5 1 6 14 1 6 14 1 2 9 ST (a) ST (d) ST (c) ST (b) Scheduling Table Updates at Neighbor Node 4 S – Source Id D – Destination Id P – Priority Index Piggy backed priority information Piggy-backed priority information Figure 6.25. Piggy-backing and scheduling table update mechanism in DPS. J. P. Sheu
  • 61. Distributed Wireless Ordering Protocol (DWOP) Protocol (DWOP) „ DWOP based on the DSP, ensure that packet access the medium according to the order specified by an ideal f h d l h FIFO reference schedule such as FIFO „ Each node builds up a scheduling table (ST) ordered di t th h d i l ti according to the overheard arrival times „ A node is made eligible to contend for the channel only if its locally queued packet has a smaller arrival time its locally queued packet has a smaller arrival time compared to all other arrival times in its ST „ Scheduling problems: Information asymmetry and „ Scheduling problems: Information asymmetry and Perceived collisions J. P. Sheu
  • 62. Distributed Wireless Ordering P t l (DWOP) Protocol (DWOP) „ Information asymmetry: a transmitting node might not be „ Information asymmetry: a transmitting node might not be aware of the arrival times of packets queued at another node which is not within its transmission range g „ Solution: a receiver find that the sender is transmitting out of order, an out-of-order notification is piggy-backed by the receiver on the control packet (CTS/ACK) on the control packet (CTS/ACK) „ Perceived collisions: the ACK packet collides at the node, the corresponding entry in the ST will never be removed the corresponding entry in the ST will never be removed „ Solution: when a node observes that its rank remains fixed while packets whose PR are below the priority of its packet are being transmitted, it deletes the oldest entry from its ST J. P. Sheu
  • 63. 2 1 3 B A 2 1 3 4 B A 6 5 C 4 4 Coverage region of flow A Coverage region of flow A (a) (b) Coverage region of flow B Coverage region of flow C Figure 6.26 (a) Information asymmetry. (b) Perceived collisions. J. P. Sheu
  • 64. MAC Protocols with Directional Antennas Antennas
  • 65. MAC Protocol Using Directional Antennas Antennas „ Advantages „ Advantages „ Reduced signal interference, increase system throughput, and improved channel reuse A i „ Assumptions „ Only one radio transceiver can transmit and receive only one packet at any given time p y g „ M directional antennas, each antennas having a conical radiation pattern, spanning an angle of 2π/M radians (See Figure 6.28) g ) „ Adjacent antennas never overlap „ If a node transmits when all its antennas are active, then the transmission’s radiation pattern is similar to that of an omni- transmission s radiation pattern is similar to that of an omni- directional antennas „ Packet transmission--See Figure 6.29 J. P. Sheu
  • 66. Radiation Pattern for Antenna 5 for Antenna 5 Radiation Pattern for Antenna 4 Radiation Pattern for Antenna 6 Radiation Pattern for Antenna 6 Radiation Pattern for Antenna 3 Radiation Pattern for Antenna 1 Radiation Pattern for Antenna 2 Node with 6 antennas (M = 6) Fi 6 28 R di i f di i l Figure 6.28. Radiation patterns of directional antennas. J. P. Sheu
  • 67. RTS S N d RTS RTS Source Node RTS RTS DATA CTS CTS CTS RTS Destination Node CTS CTS CTS CTS Figure 6.29. Packet transmission. J. P. Sheu
  • 68. DBTMA: Directional Busy Tone- Based MAC Protocol Based MAC Protocol „ Adapt the DBTMA protocol for use with directional „ Adapt the DBTMA protocol for use with directional antennas. „ Directional Antenna „ N antenna elements, a sector = 360/N „ Unicast: only a single antenna element B d t ll th t l t „ Broadcast: all the antenna elements „ Protocol: a) sender transmits RTS in all directions, b) receiver sends back CTS to the sender with the direction of maximum power and turns on the BTr in the direction to the sender, c) sender turns on the BTt in the direction of receiver and transmits data packet (See Figure 6.30 b) p ( g ) „ This protocol is not guaranteed to be collision free (see Fig. 6.31 b) J. P. Sheu
  • 69. B Directional BTt of Node A C A D B C A B D D Active session Request for transmission Directional transmission From Node C to Node D Omnidirectional BTt of Node A (a) (b) (a) (b) Figure 6.30. Directional DBTMA: Example 1. J. P. Sheu
  • 70. Directional BTr B A A r of Node B B C B Directional transmission From Node C to Node D C X D A i i D From Node C to Node D Active session Omnidirectional BTr of Node B (a) (b) Figure 6.31. Directional DBTMA: Example 2. J. P. Sheu
  • 71. Directional MAC Protocols for Ad Hoc Wireless Networks Hoc Wireless Networks „ D MAC: assume each node knows about the location of neighbors „ D-MAC: assume each node knows about the location of neighbors „ In the first directional MAC scheme (DMAC-1) „ Directional RTS (DRTS)Æ omni-directional CTS (OCTS)Æ Directional DATA (DDATA)Æ Directional ACK(DACK) Directional DATA (DDATA)Æ Directional ACK(DACK) „ May increase the probability of control packet collisions „ See Figure 6.32 (if node E send a packet to node A, it will collide the OCTS or DACK) OCTS or DACK) „ In the second directional MAC scheme (DMAC-2) „ Both the directional RTS (DRTS) and omni-directional RTS (ORTS) transmissions are used transmissions are used „ Reduced control packet collisions „ Rules for using DRTS and ORTS: ORTS f th di ti l t bl k d „ ORTS: none of the directional antennas are blocked „ DRTS : otherwise „ Another packet called directional wait-to-send (DWTS) is used in this scheme (See Fig re 6 33) J. P. Sheu scheme (See Figure 6.33)
  • 72. DRTS DRTS E OCTS DATA OCTS OCTS DATA A B D C ACK DATA ACK Transmission Range of the Node Control/Data Packet Data session Data session Non-permissible session Figure 6.32. Operation of DMAC protocol. J. P. Sheu
  • 73. DRTS A B C D OCTS DATA OCTS ORTS DWTS ACK Control/Data Packet Transmission Range of the Node Control/Data Packet Data session Non-Permissible Session Figure 6.33. Operation of DMAC protocol. J. P. Sheu
  • 74. Other MAC Protocols O e C o oco s
  • 75. MMAC: Multi-Channel MAC P t l Protocol A ti „ Assumptions: „ No dedicated control channel „ N channels for data transmission „ Each node maintains a data structure called PreferableChannelList (PCL) „ Three types for channels: „ High preference channel (HIGH): the channel is selected by the current node and is used by the node „ Medium preference channel (MID): a channel which is free and is not p ( ) being currently used „ Low preference channel (LOW): such a channel is already being used in the transmission range of the node by other neighboring nodes g y g g J. P. Sheu
  • 76. MMAC: Multi-Channel MAC P t l ( t ) Protocol (cont.) Ti i di id d i b i l d d i „ Time is divided into beacon intervals and every node is synchronized by periodic beacon transmissions Ad hoc traffic indication messages (ATIM) window is „ Ad hoc traffic indication messages (ATIM) window is used to negotiate for channels for transmission „ ATIM, ATIM-ACK, and ATIM-RES (ATIM-reservation) „ ATIM, ATIM ACK, and ATIM RES (ATIM reservation) message „ ATIM messages takes place on a particular channel (default h l) channel) „ Operation of the MMAC protocol is illustrated in Figure 6 34 6.34 „ The receiver plays a dominant role in channel selection J. P. Sheu
  • 77. ATIM Window ATIM Window A ATIM DATA ATIM window B ATIM ACK ACK ATIM window ATIM i d C ATIM-ACK ACK ATIM window ATIM window Dozing ATIM window Beacon interval Power saving mechanism for DCF: Node A announces a buffered frame for B using an ATIM frame. Node B replies by sending an ATIM-ACK, and both A and B stay awake during the entire Chih-Yung Chang 77 beacon interval. The actual data transmission from A to B is completed during the beacon interval. Since C does not have any frame to send or receive, it dozes after the ATIM window.
  • 78. S1 R1 S2 R2 ATIM ATIM ATIM-ACK(1) ATIM-ACK(1) ATIM RES(1) ATIM ATIM ACK(2) ATIM Window ATIM-RES(1) ATIM-ACK(2) ATIM-RES(2) Window RTS RTS Beacon I l CTS DATA CTS DATA Interval ACK On Channel 1 . ACK On Channel 2 . . . . . . . . Start of Next ATIM Window Figure 6.34. Operation of MMAC protocol. J. P. Sheu
  • 79. MMAC: Multi-Channel MAC Protocol (cont ) Protocol (cont.) „ Channel selection mechanism: „ If a HIGH state channel exists in node R’s PCL then that channel is l d selected „ Else if there exists a HIGH state channel in the PCL of node S then this channel is selected „ Else if there exists a common MID state channel in the PCLs of both node S and node R then that channel is selected El if h i MID l f h d h h „ Else if there exists a MID state at only one of the two nodes then that channel is selected „ if all channels in both PCLs are in LOW state the channel with the least count is selected J. P. Sheu
  • 80. MCSMA: Multi-Channel CSMA MAC P t l MAC Protocol „ Select an idle channel randomly and employ the notion of soft channel „ Select an idle channel randomly and employ the notion of soft channel reservation „ Assumptions „ N channel: bandwidth = W/N W is the total bandwidth for „ N channel: bandwidth = W/N, W is the total bandwidth for communication „ An idle node (which is not transmitting packets) continuously monitors all the N channels the N channels „ Idle state: total received signal strength (TRSS) < sensing threshold (ST) „ Maintain a free-channels list „ Channel selection protocol: „ Channel selection protocol: „ if free-channels list is empty then wait for long inter-frame space time (LIFS) + back-off period „ if the channel remains idle start transmitting on this channel „ if the channel remains idle start transmitting on this channel „ if free-channels list is non-empty then first checks whether the channel it used for its most recent successful transmission in the list „ then use this channel for its new transmission else in the free channels is J. P. Sheu „ then use this channel for its new transmission else in the free-channels is randomly chosen
  • 81. MCSMA: Multi-Channel CSMA MAC Protocol (cont ) MAC Protocol (cont.) „ Before the actual packet transmission „ if TRSS of the chosen channel < ST for at least LIFS period initiate packet transmission p „ otherwise initiate back-off delay after the LIFS time period „ During the back-off period, if (TRSS of the chosen channel > ST) back off is immediately canceled back-off is immediately canceled „ A new back- off delay is scheduled when the TRSS again goes below ST „ After successfully transmitting a packet, the sender node notes the ID of the channel used and this channel would be given preference for its next transmission given preference for its next transmission „ When the number of channel is sufficiently large, each node tends to reserve a channel for itself J. P. Sheu
  • 82. PCM: Power Control MAC Protocol for Ad Hoc Networks Protocol for Ad Hoc Networks Th PCM ll d t th i t i i l l „ The PCM allows nodes to vary their transmission power levels on a per-packet basis „ BASIC scheme „ RTS and CTS are transmitted with maximum power pmax „ The RTS is received at the receiver with signal level pr „ the receiver calculate the desired power level pdesired based on the received power level pr, the transmitted power level pmax, and the noise level at receiver „ In the second method, when the source receives the CTS (in maximum power) packet, it calculates pdesired as follows: ( / ) R h R i th i i pdesired = ( pmax/ pr) x Rxthresh x c, where Rxthresh is the minimum necessary received signal strength and c is the constant „ Drawbacks: May the probability of collision (see Figure 6.35) J. P. Sheu
  • 83. Carrier-Sensing Zone Carrier-Sensing Zone For CTS RTS X g For RTS For CTS A B RTS CTS DATA Transmission Range for RTS Transmission Range for CTS DATA ACK Transmission Range for DATA Transmission Range for ACK Y Y Figure 6.35. Packet transmission in BASIC scheme. J. P. Sheu
  • 84. PCM: Power Control MAC Protocol for Ad Hoc Networks Protocol for Ad Hoc Networks „ Solution: „ RTS and CTS are transmitted with maximum power pmax p pmax „ Carrier-sensing zone: the received signal is not high enough to decode it correctly g y „ Transmit the DATA packet at maximum power level pmax periodically p y „ The duration of each such transmission must larger than the time required for physical carrier sensing (see than the time required for physical carrier sensing (see Figure 6.36) J. P. Sheu
  • 85. EIFS Pmax Pdesired 0 RTS CTS DATA ACK SIFS Fi 6 36 T i i tt i PCM Figure 6.36 . Transmission power pattern in PCM. J. P. Sheu
  • 86. RBAR: Receiver-Based Autorate Protocol Protocol „ Rate Adaptation Mechanism „ run at the receiver instead of being located at the sender consist of channel quality estimation and rate selection „ consist of channel quality estimation and rate selection „ Rate selection is done during RTS-CTS packet exchange „ The RTS and CTS packets carry the chosen modulation rate „ The RTS and CTS packets carry the chosen modulation rate and the size of the data packet, instead of the duration of the reservation (see Figure 6.37) „ The rate chosen by the sender and receiver are different „ DRTS calculated by the neighbor nodes of the sender would not be valid if the rates chosen by the sender and receiver are different if the rates chosen by the sender and receiver are different „ Overcome problem: a special MAC header containing a reservation subheader (RSH) which contains control information for determining the transmission duration J. P. Sheu the transmission duration
  • 88. RBAR: Receiver-Based Auto-rate Protocol (cont ) Protocol (cont.) „ Channel quality estimation „ The receiver uses a sample of the instantaneous received signal strength at the end of RTS reception strength at the end of RTS reception „ Rate selection algorithm „ A simple threshold based technique is used e g signal to noise „ A simple threshold based technique is used e.g. signal to noise ratio (SNR) „ It is important that the best available channel quality estimates are used for rate selection J. P. Sheu
  • 89. ICSMA: Interleaved Carrier-Sense Multiple Access Protocol Multiple Access Protocol „ Efficiently overcomes the exposed terminal problem (see Figure 6.38) „ Node C is called a send-exposed node, and node E is called a receiver-exposed node receiver exposed node „ The total available bandwidth is split into two equal channels (say, channel 1 and channel 2) „ The handshaking process is interleaved between the two channels „ Sender uses a channel (channel 1 ) to send RTS and DATA while receiver uses another channel (channel 2) to send CTS and ACK receiver uses another channel (channel 2) to send CTS and ACK „ A node hear RTS in a particular channel and do not hear CTS on the other channel, it can send RTS in the same channel „ A node hear CTS in a particular channel and do not hear RTS on the other channel, it can send CTS in the same channel J. P. Sheu
  • 90. A B C E F D Data session Non-permissible session J. P. Sheu
  • 91. ICSMA: Interleaved Carrier-Sense M lti l A P t l ( t ) Multiple Access Protocol (cont.) „ Each node maintains a structure called extended network allocation vector (E-NAV) „ Two linked lists of blocks (SEList and REList): „ Two linked lists of blocks (SEList and REList): „ List looks like s1, f1; s2, f2;. . .; sk, fk, where si denotes start time of the i-th block list and fi denotes finish time of the i-th block „ SEList : the node would be sender-exposed in the future such that sj < t < fj „ REList : the node would be receiver exposed in the future such „ REList : the node would be receiver-exposed in the future such that sj < t < fj „ Both lists are updated when RTS and CTS packets are received by the node „ See Figure 6.39 J. P. Sheu
  • 92. RTS DATA Sender CTS ACK Receiver Figure 6.39. (a) Packet transmissions in 802.11 DCF J. P. Sheu
  • 94. Summary Summary „ We have discussed the characteristics and operating principles of several MAC schemes „ Several International standards exists for MANETs, such as IEEE 802.11a, b, and g „ New Standards are still be developed such as UWB, IEEE 802.16 (WiMax) F t di ti d t h „ Future directions and current research: „ Hidden/exposed terminal problem „ Interference limited model „ Interference limited model „ Energy conservation „ Single channel v.s. Multiple channels J. P. Sheu
  • 95. Summary (cont ) Summary (cont.) „ Multi-hop networks „ Fairness among competing nodes Fairness among competing nodes „ Directional antennas „ QoS issues J. P. Sheu
  • 96. Exercises Exercises „ 1, 4, 5, 10, 14, 15 J. P. Sheu