MAC Protocols of ADHOC Network: by Shashi Gurung Assistant Professor Ctiemt
MAC Protocols of ADHOC Network: by Shashi Gurung Assistant Professor Ctiemt
MAC Protocols of ADHOC Network: by Shashi Gurung Assistant Professor Ctiemt
network
By Shashi Gurung
Assistant Professor
CTIEMT
MAC protocols
The topology is highly dynamic and frequent changes in the topology may
be hard to predict.
MAC is responsible for resolving the conflicts among different nodes for
channel access.
There are two problems
Hidden terminal problem
A is hidden for C
Exposed terminals
A B C
B sends to A, C wants to send to another terminal (not A or B)
Node scheduling is done in a manner so that all nodes are treated fairly and
no node is starved of bandwidth.
Scheduling-based schemes are also used for enforcing priorities among flows
whose packets are queued at nodes.
Some scheduling schemes also consider battery characteristics.
Other protocols are those MAC protocols that do not strictly fall under the
above categories.
Contention-based protocols without reservation
receiver address
packet size
The neighbor node that overhears an RTS packet has to defer its own
transmission until the associated CTS packet is transmitted.
Then any node overhearing a CTS packet would defer for the length of
expected data transmission When a node wants to transmit a data packet,
it first transmit a RTS (Request To Send) frame.
The receiver node, on receiving the RTS packet, if it is ready to receive
the data packet, transmits a CTS (Clear to Send) packet.
Once the sender receives the CTS packet without any error, it starts
transmitting the data packet.
If a packet transmitted by a node is lost, the node uses the binary
exponential back-off (BEB) algorithm to back off a random interval of
time before retrying.
The binary exponential back-off mechanism used in MACA might
starves flows sometimes.
MACA examples
MACA avoids the problem of hidden terminals
A and C want to
send to B
A sends RTS first RTS
B wants to send to A, C
to another terminal
RTS RTS
now C does not have
CTS
to wait for it cannot A B C
receive CTS from A 11
Limitations
MACA does not provide ACK
RTS-CTS approach does not always solve the hidden node problem
Example
A sends RTS to B
The sender senses the carrier to see and transmits a RTS (Request To Send)
frame if no nearby station transmits a RTS.
The receiver replies with a CTS (Clear To Send) frame.
Neighbors
see CTS, then keep quiet.
see RTS but not CTS, then keep quiet until the CTS is back to the sender.
Collisions
CTS from B to A
Data from A to B
ACK from B to A