MAC Protocols For Ad-Hoc Wireless Networks
MAC Protocols For Ad-Hoc Wireless Networks
Networks
2
Issues in designing MAC protocol for AD HOC N/W
• Hidden and exposed terminal problems:
Hidden terminal problem:
refers to collision of packets at a receiving node due to simultaneous
transmission of these nodes that are not within direct transmission range of
sender but are within the transmission range of receiver
Exposed terminal problem:
refers to inability of a node, which is blocked by nearby transmitting node
to transmit another node
Eg: if node B is transmitting, node c -exposed node
can transmit but it will not, conluding B is transmitting
3
Issues in designing MAC protocol for AD HOC N/W
• Error-Prone Shared Broadcast Channel
while broadcast, receiving nodes should not be interfered with other signals
MAC protocol should resolve this contention of medium access and also
maintain fairness
• Distributed Nature/Lack of Central Coordination
No central coordination in ad hoc networks as base stations in cellular networks.
Nodes keep on moving, hence MAC to properly schedule nodes to access
the common channel.
This is done by exchange of control information without occupying more
bandwidth
• Mobility of Nodes:
very important factor affecting throughput of protocol.
Nodes are mobile most of the time.
Bandwidth reservation has no effect, so protocol has to maintain system
performance not affected by mobility
4
Design goals of a MAC Protocol
Design goals of a MAC protocol for ad hoc wireless networks
• The operation of the protocol should be distributed.
• The protocol should provide QoS support for real-time traffic.
• The access delay, which refers to the average delay experienced by any packet
to get transmitted, must be kept low.
• The available bandwidth must be utilized efficiently.
• The protocol should ensure fair allocation of bandwidth to nodes.
• Control overhead must be kept as low as possible.
• The protocol should minimize the effects of hidden and exposed terminal
problems.
• The protocol must be scalable to large networks.
• It should have power control mechanisms.
• The protocol should have mechanisms for adaptive data rate control.
• It should try to use directional antennas to have reduced interference, increased
spectrum reuse and reduced power consumption
• The protocol should provide synchronization among nodes. 5
Classifications of MAC protocols
Ad hoc network MAC protocols can be classified into three types:
• Contention-based protocols
• Contention-based protocols with reservation mechanisms
• Contention-based protocols with scheduling mechanisms
• Other MAC protocols (do not fall in any of the above category)
MAC Protocols for Ad Hoc
Wireless Networks
7
Classifications of MAC Protocols
Contention-based protocols with reservation mechanisms
- Ad hoc networks has to support real time traffic with QoS guarantee
- protocol with bandwidth reserve mechanism is required
• Synchronous protocols: All nodes need to be time synchronized so that
reservation is known to other nodes. Global time synchronization is difficult
to achieve.
• Asynchronous protocols: does not require global time synchronization.These
protocols use relative time information for effecting reservations.
Contention-based protocols with scheduling mechanisms
• Node scheduling is done in a manner so that all nodes are treated fairly and
no node is starved of bandwidth.
• Scheduling-based schemes are also used for enforcing priorities among flows
whose packets are queued at nodes.
• Some scheduling schemes also consider battery characteristics.
8
Contention-based protocols
MACAW: A Media Access Protocol for Wireless LANs is based
on MACA (Multiple Access Collision Avoidance) Protocol
MACA
• alternative to CSMA to avoid hidden terminals issue
• When a node wants to transmit a data packet, it first transmit a RTS
(Request To Send) frame.
• The receiver node, on receiving the RTS packet, if it is ready to receive the
data packet, transmits a CTS (Clear to Send) packet.
• Once the sender receives the CTS packet without any error, it starts
transmitting the data packet.
• If a packet transmitted by a node is lost, the node uses the binary exponential
back-off (BEB) algorithm to back off a random interval of time before
retrying.
9
MACA Protocol
10
MACA examples
MACA avoids the problem of hidden terminals
• A and C want to
send to B
• A sends RTS first
RTS
• C waits after receiving
CTS from B CTS CTS
A B C
RTS
CTS
DS
Data
Ack
13
MACAW
New control packet type: data-sending (DS), a small packet (30
Byte) containing information such as the duration of the
forthcoming data transmission
Another improvement is the RRTS pkt(Request for request to
send)
RRTS RRTS
S2 R2 R1 S1
14
Contention-based protocols
Floor acquisition Multiple Access Protocols (FAMA)
• Based on a channel access discipline which consists of a carrier-sensing
operation and a collision-avoidance dialog between the sender and the
intended receiver of a packet.
• Floor acquisition refers to the process of gaining control of the channel. At
any time only one node is assigned to use the channel.
• Carrier-sensing by the sender, followed by the RTS-CTS control packet
exchange, enables the protocol to perform as efficiently as MACA.
• Two variations of FAMA
• RTS-CTS exchange with no carrier-sensing uses the ALOHA protocol
for transmitting RTS packets.
• RTS-CTS exchange with non-persistent carrier-sensing uses non-
persistent CSMA for the same purpose.
15
RTS-CTS exchange with no carrier-sensing
ALOHA
each node or station transmits a frame without trying to detect whether the transmission
channel is idle or busy.
If the channel is idle, then the frames will be successfully transmitted.
If two frames attempt to occupy the channel simultaneously, collision of frames will
occur and the frames will be discarded.
These stations may choose to retransmit the corrupted frames repeatedly until successful
transmission occurs.
Pure ALOHA
time of transmission is continuous.
Slotted ALOHA
reduces the number of collisions and doubles the capacity of pure ALOHA. The shared
channel is divided into a number of discrete time intervals called slots. A station can
transmit only at the beginning of each slot.
still be collisions if more than one station tries to transmit at the beginning of the same
time slot.
16
RTS-CTS exchange with no carrier-sensing
eg:MACA
MACA belongs to the category of FAMA
-No carrier sensing
-If node is ready it transmits RTS, receiver sends CTS
-Neighbor defers transmission upon hearing RTS/CTS
-For data transmission to be collision free
duration of RTS is twice the channel propagation delay
- Transmission of burst of packets not possible in MACA
17
FAMA-NTR
FAMA –Non persistent Transmit Request (NTR)
- combines non persistent carrier sensing with RTS and CTS
- sender node senses the channel
if free transmits RTS, otherwise wait for random time
if CTS not received or corrupted , sender takes a random back off and retries
later
if CTS received without error, it starts transmitting data packet burst
- For sender to transmit packet bursts, rxr waits for τ sec
after processing each data packet.
τ- max. channel propagation time
- sender node has to wait for 2τ for rxr to receive RTS and send CTS back
- After final data packet, sender waits for τ to allow the destination to receive
the packet
18
Contention-based protocols-MARCH
A D A B C D
B C
RTS RTS
CTS1
CTS
Data
Data RTS CTS2
CTS Data
CTS3
Data RTS
Data
CTS
Data
19
MACA MARCH
Contention-based protocols-MARCH
Media Access with Reduced Handshake (MARCH) is a receiver-
initiated protocol.
In MACAW , RTS-CTS takes place for every data packet to be
sent
In MARCH it is sent only for the first packet of the stream
Time taken for data transmission in MARCH is less when
compared to the MACAW
Throughput is significantly high
control overhead is less in MARCH
Bandwidth consumption is less
20
Contention-based Protocols with
Reservation Mechanisms
Contention-based Protocols with Reservation Mechanisms
• Contention occurs during the resource (bandwidth) reservation phase.
• Once the bandwidth is reserved, the node gets exclusive access to the
reserved bandwidth.
• QoS support can be provided for real-time traffic.
Distributed packet reservation multiple access protocol (D-
PRMA)
• It extends the centralized packet reservation multiple access (PRMA)
scheme into a distributed scheme that can be used in ad hoc wireless
networks.
• PRMA was designed in a wireless LAN with a base station.
• D-PRMA extends PRMA protocol in a wireless LAN.
• D-PRMA is a TDMA-based scheme. The channel is divided into fixed-
and equal-sized frames along the time axis.
21
D-PRMA
• every frame consists of s slots and each slot m mini-slots
• Each mini slot has 2 control fields RTS/BI and CTS/BI
• BI stands for busy indicator
• These control fields used for slot reservation
• Nodes ready to transmit contend for first mini slot of each slot.
• The remaining m-1 slots are for the winning node
• If no node wins first mini slot , the remaining slots are continuously used
for contention
22
Contention-based protocols with
Reservation Mechanisms
Collision avoidance time allocation protocol (CATA)
• based on dynamic topology-dependent transmission scheduling
• Nodes contend for and reserve time slots by means of a distributed
reservation and handshake mechanism.
• Support broadcast, unicast, and multicast transmissions.
• The operation is based on two basic principles:
• The receiver(s) of a flow must inform the potential source nodes about
the reserved slot on which it is currently receiving packets. The source
node must inform the potential destination node(s) about interferences
in the slot.
• Usage of negative acknowledgements for reservation requests, and
control packet transmissions at the beginning of each slot, for
distributing slot reservation information to senders of broadcast or
multicast sessions. 23
Collision avoidance time allocation protocol (CATA)
Time is divided into equal frames.
Each frame into N slots
Each slot into five mini slots
First 4 mini slots are called Control Mini Slots (CMS)
5th slot is Data Mini Slot (DMS)
DMS is much longer than CMS
24
Frame format in CATA
Collision avoidance time allocation protocol (CATA)
25
Collision avoidance time allocation protocol (CATA)
26
Contention-based protocols with
Reservation Mechanisms
Hop reservation multiple access protocol (HRMA)
• a multichannel MAC protocol which is based on half-duplex, very slow
frequency-hopping spread spectrum (FHSS) radios
• uses a reservation and handshake mechanism to enable a pair of
communicating nodes to reserve a frequency hop, thereby guaranteeing
collision-free data transmission.
• can be viewed as a time slot reservation protocol where each time slot is
assigned a separate frequency channel.
Soft reservation multiple access with priority assignment
(SRMA/PA)
• Developed with the main objective of supporting integrated services of
real-time and non-real-time application in ad hoc networks, at the same
time maximizing the statistical multiplexing gain.
• Nodes use a collision-avoidance handshake mechanism and a soft
reservation mechanism.
27
Frame format in SRMA/PA
28
Contention-based protocols with
Reservation Mechanisms
Five-Phase Reservation Protocol (FPRP)
• a single-channel time division multiple access (TDMA)-based broadcast
scheduling protocol.
• Nodes uses a contention mechanism in order to acquire time slots.
• The protocol assumes the availability of global time at all nodes.
29
Contention-based protocols with
Reservation Mechanisms
MACA with Piggy-Backed Reservation (MACA/PR)
• Provide real-time traffic support in multi-hop wireless networks
• Based on the MACAW protocol with non-persistent CSMA
• The main components of MACA/PR are:
• A MAC protocol
• A reservation protocol
• A QoS routing protocol
30
Contention-based protocols with
Reservation Mechanisms
Real-Time Medium Access Control Protocol (RTMAC)
• Provides a bandwidth reservation mechanism for supporting real-time traffic
in ad hoc wireless networks
• RTMAC has two components
• A MAC layer protocol is a real-time extension of the IEEE 802.11 DCF.
– A medium-access protocol for best-effort traffic
– A reservation protocol for real-time traffic
• A QoS routing protocol is responsible for end-to-end reservation and
release of bandwidth resources.
31
Contention-based protocols with
Scheduling Mechanisms
Protocols in this category focus on packet scheduling at the nodes
and transmission scheduling of the nodes.
The factors that affects scheduling decisions
• Delay targets of packets
• Traffic load at nodes
• Battery power
Distributed priority scheduling and medium access in Ad Hoc
Networks present two mechanisms for providing quality of service
(QoS)
• Distributed priority scheduling (DPS) – piggy-backs the priority tag of a
node’s current and head-of-line packets o the control and data packets
• Multi-hop coordination – extends the DPS scheme to carry out scheduling
over multi-hop paths. 32
Contention-based protocols with
Scheduling Mechanisms
Distributed Wireless Ordering Protocol (DWOP)
• A media access scheme along with a scheduling mechanism
• Based on the distributed priority scheduling scheme
Distributed Laxity-based Priority Scheduling (DLPS) Scheme
• Scheduling decisions are made based on the states of neighboring nodes and
feed back from destination nodes regarding packet losses
• Packets are recorded based on their uniform laxity budgets (ULBs) and the
packet delivery ratios of the flows. The laxity of a packet is the time
remaining before its deadline.
33
MAC Protocols that use directional
Antennas
MAC protocols that use directional antennas have several
advantages:
• Reduce signal interference
• Increase in the system throughput
• Improved channel reuse
MAC protocol using directional antennas
• Make use of an RTS/CTS exchange mechanism
• Use directional antennas for transmitting and receiving data packets
Directional Busy Tone-based MAC Protocol (DBTMA)
• It uses directional antennas for transmitting the RTS, CTS, data frames, and
the busy tones.
Directional MAC Protocols for Ad Hoc Wireless Networks
• DMAC-1, a directional antenna is used for transmitting RTS packets and
omni-directional antenna for CTS packets.
• DMAC-1, both directional RTS and omni-directional RTS transmission are
used. 34
Other MAC Protocols
Multi-channel MAC Protocol (MMAC)
• Multiple channels for data transmission
• There is no dedicated control channel.
• Based on channel usage channels can be classified into three types: high
preference channel (HIGH), medium preference channel (MID), low
preference channel (LOW)
Multi-channel CSMA MAC Protocol (MCSMA)
• The available bandwidth is divided into several channels
Power Control MAC Protocol (PCM) for Ad Hoc Networks
• Allows nodes to vary their transmission power levels on a per-packet basis
Receiver-based Autorate Protocol (RBAR)
• Use a rate adaptation approach
Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
• The available bandwidth is split into two equal channels
• The handshaking process is interleaved between the two channels. 35