MAC Protocols For Ad-Hoc Wireless Networks
MAC Protocols For Ad-Hoc Wireless Networks
MAC Protocols For Ad-Hoc Wireless Networks
Networks
2
V. Nagaraj, Dr. Pauls Engineering College
Issues
The main issues need to be addressed while designing a MAC
protocol for ad hoc wireless networks:
• Hidden and exposed terminal problems:
• Hidden nodes:
– Hidden stations: Carrier sensing may fail to detect another station.
For example, A and D.
– Fading: The strength of radio signals diminished rapidly with the
distance from the transmitter. For example, A and C.
• Exposed nodes:
– Exposed stations: B is sending to A. C can detect it. C might want to
send to E but conclude it cannot transmit because C hears B.
– Collision masking: The local signal might drown out the remote
transmission.
• Error-Prone Shared Broadcast Channel
• Distributed Nature/Lack of Central Coordination
• Mobility of Nodes: Nodes are mobile most of the time.
3
V. Nagaraj, Dr. Pauls Engineering College
Wireless LAN configuration
A B C
Laptops
radio obstruction
Wireless
D LAN
Palmtop E
LAN
4
V. Nagaraj, Dr. Pauls Engineering College
The 802.11 MAC Sublayer Protocol
8
V. Nagaraj, Dr. Pauls Engineering College
Classifications of MAC Protocols
Contention-based protocols with scheduling mechanisms
• Node scheduling is done in a manner so that all nodes are treated fairly and
no node is starved of bandwidth.
• Scheduling-based schemes are also used for enforcing priorities among flows
whose packets are queued at nodes.
• Some scheduling schemes also consider battery characteristics.
Other protocols are those MAC protocols that do not strictly fall
under the above categories.
9
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols
MACAW: A Media Access Protocol for Wireless LANs is based
on MACA (Multiple Access Collision Avoidance) Protocol
MACA
• When a node wants to transmit a data packet, it first transmit a RTS
(Request To Send) frame.
• The receiver node, on receiving the RTS packet, if it is ready to receive the
data packet, transmits a CTS (Clear to Send) packet.
• Once the sender receives the CTS packet without any error, it starts
transmitting the data packet.
• If a packet transmitted by a node is lost, the node uses the binary exponential
back-off (BEB) algorithm to back off a random interval of time before
retrying.
The binary exponential back-off mechanism used in MACA might
starves flows sometimes. The problem is solved by MACAW.
10
V. Nagaraj, Dr. Pauls Engineering College
MACA Protocol
sender receiver
idle idle
packet ready to send; RTS
data;
ACK
RxBusy time-out;
wait for the RTS RTS;
time-out ∨ CTS
ACK right to send data;
time-out ∨
NAK
NAK;
RTS CTS; data
wait for
wait for ACK data
21
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols with
Reservation Mechanisms
Hop reservation multiple access protocol (HRMA)
• a multichannel MAC protocol which is based on half-duplex, very slow
frequency-hopping spread spectrum (FHSS) radios
• uses a reservation and handshake mechanism to enable a pair of
communicating nodes to reserve a frequency hop, thereby guaranteeing
collision-free data transmission.
• can be viewed as a time slot reservation protocol where each time slot is
assigned a separate frequency channel.
Soft reservation multiple access with priority assignment
(SRMA/PA)
• Developed with the main objective of supporting integrated services of
real-time and non-real-time application in ad hoc networks, at the same
time maximizing the statistical multiplexing gain.
• Nodes use a collision-avoidance handshake mechanism and a soft
reservation mechanism.
22
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols with
Reservation Mechanisms
Five-Phase Reservation Protocol (FPRP)
• a single-channel time division multiple access (TDMA)-based broadcast
scheduling protocol.
• Nodes uses a contention mechanism in order to acquire time slots.
• The protocol assumes the availability of global time at all nodes.
• The reservation takes five phases: reservation, collision report, reservation
confirmation, reservation acknowledgement, and packing and elimination
phase.
MACA with Piggy-Backed Reservation (MACA/PR)
• Provide real-time traffic support in multi-hop wireless networks
• Based on the MACAW protocol with non-persistent CSMA
• The main components of MACA/PR are:
• A MAC protocol
• A reservation protocol
• A QoS routing protocol 23
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols with
Reservation Mechanisms
Real-Time Medium Access Control Protocol (RTMAC)
• Provides a bandwidth reservation mechanism for supporting real-time traffic
in ad hoc wireless networks
• RTMAC has two components
• A MAC layer protocol is a real-time extension of the IEEE 802.11 DCF.
– A medium-access protocol for best-effort traffic
– A reservation protocol for real-time traffic
• A QoS routing protocol is responsible for end-to-end reservation and
release of bandwidth resources.
24
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols with
Scheduling Mechanisms
Protocols in this category focus on packet scheduling at the nodes
and transmission scheduling of the nodes.
The factors that affects scheduling decisions
• Delay targets of packets
• Traffic load at nodes
• Battery power
Distributed priority scheduling and medium access in Ad Hoc
Networks present two mechanisms for providing quality of service
(QoS)
• Distributed priority scheduling (DPS) – piggy-backs the priority tag of a
node’s current and head-of-line packets o the control and data packets
• Multi-hop coordination – extends the DPS scheme to carry out scheduling
over multi-hop paths. 25
V. Nagaraj, Dr. Pauls Engineering College
Contention-based protocols with
Scheduling Mechanisms
Distributed Wireless Ordering Protocol (DWOP)
• A media access scheme along with a scheduling mechanism
• Based on the distributed priority scheduling scheme
Distributed Laxity-based Priority Scheduling (DLPS) Scheme
• Scheduling decisions are made based on
• The states of neighboring nodes and feed back from destination nodes
regarding packet losses
• Packets are recorded based on their uniform laxity budgets (ULBs) and the
packet delivery ratios of the flows. The laxity of a packet is the time
remaining before its deadline.
26
V. Nagaraj, Dr. Pauls Engineering College
MAC Protocols that use directional
Antennas
MAC protocols that use directional antennas have several
advantages:
• Reduce signal interference
• Increase in the system throughput
• Improved channel reuse
MAC protocol using directional antennas
• Make use of an RTS/CTS exchange mechanism
• Use directional antennas for transmitting and receiving data packets
Directional Busy Tone-based MAC Protocol (DBTMA)
• It uses directional antennas for transmitting the RTS, CTS, data frames, and
the busy tones.
Directional MAC Protocols for Ad Hoc Wireless Networks
• DMAC-1, a directional antenna is used for transmitting RTS packets and
omni-directional antenna for CTS packets.
• DMAC-1, both directional RTS and omni-directional RTS transmission are
used.
27
V. Nagaraj, Dr. Pauls Engineering College
Other MAC Protocols
Multi-channel MAC Protocol (MMAC)
• Multiple channels for data transmission
• There is no dedicated control channel.
• Based on channel usage channels can be classified into three types: high
preference channel (HIGH), medium preference channel (MID), low
preference channel (LOW)
Multi-channel CSMA MAC Protocol (MCSMA)
• The available bandwidth is divided into several channels
Power Control MAC Protocol (PCM) for Ad Hoc Networks
• Allows nodes to vary their transmission power levels on a per-packet basis
Receiver-based Autorate Protocol (RBAR)
• Use a rate adaptation approach
Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
• The available bandwidth is split into tow equal channels
• The handshaking process is interleaved between the two channels. 28
V. Nagaraj, Dr. Pauls Engineering College
Multicast routing
Expected advantages from multicast routing
• Providing efficient bandwidth
• Reducing communication cost
• Efficient delivery of data
• Supporting dynamic topology
Technical constraints for multicast routing
• Minimizing network load
• Providing basic support for reliable transmission
• Designing optimal routes
• Providing robustness, efficiency, and adaptability
Classification
• Globally, there are two main categories of multicast routing protocols:
• Tree-based protocols, and
• Mesh-based protocols
29
V. Nagaraj, Dr. Pauls Engineering College
Examples of tree-based protocols
Multicast Ad hoc On-Demand Distance Vector (MAODV) routing
protocol
Associatively-based Multicast (ABAM) routing protocol
Multicast Ad hoc On-Demand Distance Vector (MAODV)
• Extends AODV to offer multicast capabilities
• Builds shared multicast trees on-demand to connect group members
• Capable of unicast, broadcast, and multicast
Associatively-based Multicast (ABAM)
• Constructed in an attempt to reduce communication overhead and end-to-end
delay