0% found this document useful (0 votes)
10 views31 pages

2023-Ad Hoc Networks Session 06

Uploaded by

Eliyajer Gunde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views31 pages

2023-Ad Hoc Networks Session 06

Uploaded by

Eliyajer Gunde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Mobile Ad Hoc Networks

CSE341

Slide-Set 06
26th Sep 2023
Recap of Sessions so far

Introduction to Communication Contention Based with Scheduling Mechanism


Cellular Networks and Ad Hoc Networks u Distributed Priority Scheduling (DPS) and Multi-
hop coordination
Issues with Ad Hoc Networks
u Distributed Wireless Ordering Protocol (DWOP)
Media Access protocols
u Distributed Laxity based priority scheduling
u Classes of Media Access protocols scheme (DLPS)
u Contention Based Protocols
u Contention Based with Reservation
Protocols
About Assignment
General Information

u Group Formation
u Expect it to be closed today
u Else, those not in any group please request your CR to assign to
some group
u Any group size less than 4 people will NOT be acceptable
u No group can contain students from A and B section combined
u Date of Submission
u 10th November, Friday (just before the Deepavali Break)
Format for the submission

Each Group submits one Report


u Please do not make multiple submissions from each group
Restrict the
Naming Format
report to
u Section A: Axx.doc (or Axx.pdf) where xx is the Group Number about 8-12
u Section B: Bxx.doc (or Bxx.pdf) where xx is the Group Number pages max
SOFTCOPY Only – PDF or Word Document
To be submitted ONLINE (A folder will be created and shared)
Title Page to contain the following information
u Title (any relevant and suitable title cane be provided)
u Generic title like “Assignment for Ad hoc Networks course” are NOT acceptable titles
u GROUP Number
u Names and Roll-Numbers of all the Group-Members
Sections in the document

Introduction
Due weightage
u Set the context explaining the theme very briefly in a 1-2 paragraphs for how well you
Overview of the papers considered can draw the
story-line
u Just provide a very brief, in about a couple of lines on each paper that has
been considered for the document
u Bring the connectivity between the papers considered (an abstract of the
story)
Detailed write up on the papers considered
This is a
u Detailed story recommendation
u Can make the summary (or write up) of each paper a sub-section can add more
Conclusion sections
u Any inferences from the story
u Ideas for possible further ideas or topics for research to explore
MAC Protocols that use
Directional Antennas
With Directional Antennas

Advantages over Omnidirectional antennas


u Reduced signal interference
u Increased System throughput
u Improved channel-reuse – result in increased overall
capacity of channel
One Radio transceiver in each node
u Transmit and receive only one packet at a time
u Equipped with M-directional antennas
u Each antenna with conical radiation pattern spanning
an angle
u Transmission by adjacent antennas never overlap –
complete attenuation of signal outside the cone
Reading Assignment

u 3 Protocols in MAC Protocols with Directional Antennas


u To be read from the Textbook (Section 6.8)
Multi-Channel MAC Protocol
(MMAC)
MMAC

Multi=channel for data transmission Beacon Intervals


u No dedicated control channel u Time divided into “Beacon Intervals”
u N channels with enough spectral separation u Every node synchronized by periodic beacon
between channels transmissions
u N has no connection with the number of Nodes Ad hoc Traffic indication messages (ATIM)
Preferred Channel List (PCL) window
u Each Node maintains its PCL u A window in the start of the beacon interval

u Three category of Channels u IF a node has a data to send it sends a ATIM


message in this window
u HIGH preference Channel
u Medium Preference Channel
Other Control messages
u LOW preference Channel – has a counter u ATIM-ACK (ATIM acknowledge)
attached to count the number of flows chosen u ATIM-RES (ATIM reservation)
this channel
Set up procedure
u Source node sends the ATIM (includes its PCL
in the message)
u Receiver goes through the received PCL and
compares with its PCL and picks a likely
channel
u ATIM-ACK response carries the Channel
number
u If Source can transmit on the channel, it
responds with ACK-RES with Channel number
u Else, it backs-off to attempt again in the next
beacon-interval
Data transmission
u Starts with RTS-CTS-DATA-ACK format on the
chosen Channel
u Starts after the end of the ATIM Window
Channel Selection

Receiver dominant player in protocol


u Selects the channel and shares to Source node
Channel Selection
u Selects its HIGH channel if available
u Else, the HIGH of the Source node if available
u Next in priority, it looks at a MEDIUM channel that appears in both the PCLs
u Else, picks a channel that appears in one of the MED list
u Last – picks the LOW that has the smallest counter value amongst all the LOW
channels in its PCL and Source-PCL
Multi-Channel CSMA MAC
Protocol (MCSMA)
MCSMA

Multiple Channels
u Available bandwidth (W) divided into multiple N channels
u Channels are non-overlapping, each bandwidth is W/N
u Source node picks at random an Idle channel
u An idle channel is one that is not transmitting packets

Idle node
u Monitors all the channels continuously
u Channel whose Total Received Signal Strength (TRSS) is below a sensing threshold (ST) is
marked as IDLE
u Time time at which the TRSS drops below ST is noted for every channel
u Such channels are put into the Free-channel list
Channel selection

IF free-channel list empty


u Waits for any channel to become IDLE
u And waits for additional Long Inter-Frame Space (LIFS) time
u And another random access back-off period
u IF the channel remains IDLE for all the while, the the node starts transmitting on this
channel
IF free-channel list is Non-Empty
u Selects anyone of the free-channel randomly and starts transmitting
Channel Selection (contd.)

TRSS Check
u Node checks if TRSS has remained below ST for LIFS time
u Otherwise, back—off is initiated to wait for a time period that will take it beyond
the LIFS
HIGH channel
u Data packet transmitted on the selected channel
u The Channel ID is noted by the Source node as the HIGH in the PCL
When N sufficiently large
u Every node will reserve a channel for itself as its HIGH in its PCL
u As the node prefers the channel used in its last successful transmission for its next
transmission also
u This reduces the contention of two nodes for the same channel for transmission
Power Control MAC Protocol
(PCM)
PCM

Variation of Power levels


u On a per-packet basis
u Based on BASIC power control protocol
BASIC power control protocol

Maximum power transmission for Control packets


u RTS and CTS sent with maximum power Pmax
u The hand-shake used to determine the power of transmission for subsequent DATA
and ACK packets
Two methods
u RTS sends packet with Pmax and received at Receiver with power Pr
u Based on Pmax and Pr, and the noise levels, receiver node calculates the desired
power level Pdesired for the Data and ACK packets
u Receiver node specifies this Pdesired in the CTS packet to Sender node
Power control Methods

Second method
u When Receiver node receives RTS, it responds with CTS with max power Pmax
u The Source node calculates the Desired Power to transmit the DATA and ACK

The Pdesired
u calculated using the formula

u Where Rxthresh is the minimum necessary signal strength and c is a constant


Issue with BASIC scheme

A node N1 is in carrier-
sensing zone of N2 if it
can sense the signal but
cannot decode correctly
as the strength is very low

X and Y defer
transmissions for a period
EIFS to not interfere with
the RTS-CTS exchange

EIFS – Extended inter-frame space


Issue with BASIC Scheme

Signal strength of DATA ACK


u Less than RTS/CTS
u Cannot be sensed by X and Y
u If X or Y transmit after the EIFS period
u Packet from X can collide with ACK at node A
u Packet from Y can collide with DATA at node B
PCM Modification

Minimize the probability of collisions


u The source node transmits the DATA at two power levels
u At Maximum power Pmax periodically – the duration of such Pmax power transmission
being larger than that required for carrier sensing
u For every EIFS duration power is brought down to Pdesired

Std inter-frame space


Receiver based Auto rate
Protocol (RBAR)
RBAR Protocol

Rate Adaptation Approach


u At the receiver node
u Dynamically switching data rates to match channel conditions
u Optimize throughput for the given channel conditions Details of the
Two processes protocol self-
reading from
u Channel quality estimation
Textbook – Section
u Rate selection 6.9.4
Rate adaptation
u At receiver node – to avoid quality estimates becoming stale over
time (required to exchange information with Source)
RTS-CTS
u Carry chosen modulation rate and Data-packet size
Interleaved Carrier-sense
multiple access protocol
(ICSMA)
ICSMA

Two channels
u Total available bandwidth split into two EQUAL channels
u Hand-shaking is interleaved between the two channels
u Uses basic RTS-CTS-DATA-ACK of MACAW
u Source node transmits in one channel
u Receiver node responds in another channel
Details –
refer Sec
6.9.5 in
textbook

You might also like