0% found this document useful (0 votes)
21 views22 pages

Module 3 Solutions

The document discusses MAC protocols for wireless networks. It covers: 1. Classification of MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. 2. Design issues for MAC protocols including bandwidth efficiency, quality of service support, synchronization, hidden terminal problem, and exposed terminal problem. 3. Performance measurements and two common problems - hidden terminal problem and exposed terminal problem - are discussed. Various MAC protocol classes like contention-based and schedule-based are explained with examples. Low duty cycle protocols and wake-up ratio are also summarized.

Uploaded by

A To Z INFO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views22 pages

Module 3 Solutions

The document discusses MAC protocols for wireless networks. It covers: 1. Classification of MAC protocols into contention-based without reservation, contention-based with reservation, and contention-based with scheduling. 2. Design issues for MAC protocols including bandwidth efficiency, quality of service support, synchronization, hidden terminal problem, and exposed terminal problem. 3. Performance measurements and two common problems - hidden terminal problem and exposed terminal problem - are discussed. Various MAC protocol classes like contention-based and schedule-based are explained with examples. Low duty cycle protocols and wake-up ratio are also summarized.

Uploaded by

A To Z INFO
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Module 3 Solutions

1. Discuss MAC protocol and its problem in detail with example.


MAC protocol is the first protocol layer above the Physical Layer in ad hoc .The primary
task of any MAC protocol is to control the access of the nodes to shared medium.

Classification of MAC protocols :


1. Contention-based protocols without reservation/scheduling –
• Bandwidth are not reserved.
• No guarantees.
2. Contention-based protocols with reservation mechanisms –
• Bandwidth is reserved for transmission.
• Guarantees can be given.
3. Contention-based protocols with scheduling mechanisms –
• Distributed scheduling is done between nodes.
• Guarantees can be given.
4. Other protocols –
• Combine multiple features of other protocols.
• It can also use a completely new approach.

Design issues of MAC Protocol :

• Bandwidth Efficiency –
The shortage of data transfer capacity assets in these networks requires its proficient
use. To evaluate this, we could state that bandwidth capacity is the proportion of the
bandwidth used for data transmission to the complete accessible bandwidth capacity.
• Quality of Service Support –
Quality of service support is difficult due to the mobility of the nodes. Once a node
moves out of reach, the reservation in it is lost. In these networks, QoS is extremely
important because if it is being used in military environments, the service support
needed time to time.
• Synchronization –
Some instruments must be found so as to give synchronization among the nodes.
Synchronization is significant for directing the bandwidth reservation.
• Hidden Terminal Problem –
When there are two nodes, both are outside of each other’s range and try to
communicate with same node within their range at the same time, then there must be
packet collision.
• Exposed Terminal Problem –
Uncovered nodes might be denied channel access pointlessly, which implies under
usage of the bandwidth resources.
2. What are the Performance measurements for MAC protocols?

3. Write a short note on the hidden-terminal problem and exposed-terminal scenario in


detail
4. What are the Important classes of MAC protocols explain in detail with example
5. Write a short note on the two problem of RTS and CTS.
6. Explain the Low duty cycle protocols in detail with example
7. Write a short note on the Wake- up ratio
8. Explain the Contention-based protocols in detail with example
9. Explain the Schedule-based protocols in detail with example

You might also like