Wireless Medium Access Control Protocols: CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols: CS 851 Seminar University of Virginia
Wireless Medium Access Control Protocols: CS 851 Seminar University of Virginia
Protocols
CS 851 Seminar
University of Virginia
www.cs.virginia.edu/~cs851-2/course.html
Limited Delay
High Throughput
Fairness
Stability
Scalability
Robustness against channel fading
Low power consumption
Support for multimedia
Some Background
Half-Duplex Operation
Time Varying Channel
Burst Channel Errors
Location Dependent Carrier Sensing
Hidden Terminal
Exposed Terminal
Capture
D
7
Capture Effect
Power
Difference
Of A and
D signals
D B
Distributed Mac
Protocols
Random
access
Centralized MAC
Protocols
Guaranteed
access
802.11)
EY-NPMA: Elimination Yield-Nonpreemptive Priority Multiple
Access (used in HyperLan)
10
Base station has explicit control for who and when to access the
medium
12
Goals:
Try to overcome hidden & exposed terminal problems
New idea:
Reserve the channel before sending data packet
Minimize the cost of collision (control packet is much smaller than
data packet)
Main Contribution:
A three-way handshake MAC protocol : MACA
CSMA/CA
MA/CA
MACA
13
Fundamental Assumptions
Symmetry
A can hear from B B can hear from A
No capture
No channel fading
Packet error only due to collision
Data packets and control packets are transmitted in the
same channel
14
Three-Way Handshake
Nodes overhearing RTS keep quiet for some time to allow A to receive CTS
Nodes overhearing CTS keep quiet for some time to allow B to receive data
CTS (10)
packet
RTS (10)
DATA
CTS: Request
Clear ToTo
Send
RTS:
Send
D
B
C
A
E
15
A sends out RTS and set a timer and waits for CTS
If A receives CTS before timer go to zero, OK! sends data packet
Otherwise, A assumes there is a collision at B
Double the backoff counter interval
B sends out CTS, then set a timer and waits for data packet
If data packet arrives before timer go to zero, OK!
Otherwise, B can do other things
C overhears As RTS, set a timer which is long enough to allow A to receive
CTS. After the timer goes to zero, C can do other things
D overhears Bs CTS, set a timer which is long enough to allow B to receive
data packet.
E overhears As RTS and Bs CTS, set a timer which is long enough to allow B
to receive data packet.
RTS and CTS can also contain info to allow sender A to adjust power to reduce
interference
16
DATA
RTS
RTS
CTS
17
DA
R
CTTA
CTS
RTS
DATA
RTS
B
A
18
19
Summary
20
21
Goals:
This paper refined and extended MACA
22
23
Four-Way Handshake
CTS: Request
Clear ToTo
Send
RTS:
Send
RTS(T)
DATA
CTS(T)
ACK
destination
source
24
25
Five-Way Handshake
CTS:
Clear
ToTo
Send
RTS:
DS:Request
Data Sending
Send
DATA
RTS
DS
CTS
ACK
A
27
28
CT
R
TS
S
CTS
ACK
DATA
RTS
P1
P2
B2
B1
29
Unfairness
DATA
RTS
CTS
ACK
B
A
30
DATA
RTS
RTS
RR
TS
ACK
CTS
B
A
31
32
33
34
MAC
Node
MAC
MAC
Node
Single stream model merges traffic from different flows into a mixed
stream and uses a single MAC
Multiple stream model uses multiple MAC (one flow one MAC) to
achieve fairness
This idea was used by Intersil
for IEEE 802.11e in 2001
When collision
all packets in single stream MAC are used a large backoff window
Different flows packet in multiple stream MAC uses different
backoff window
36
37
Backoff Algorithms
How to determine Bo
After each collision Bo_new = Fun_inc(Bo_old)
After each successful transmission Bo_new = Fun_dec(Bo_old)
38
Key idea: all nodes have the same backoff counter to achieve
fairness
39
40
41
Per-Destination Backoff
42
Evaluation of MACAW
43
Evaluation of MACAW
Every flow has the
same data rate
32 packet per second
Total Troughput
MACA: 51.06
MACAW: 70
37% higher
44
Evaluation of MACAW
45
Evaluation of MACAW
46
Open Problems
47