Mac Protocols For Wireless Sensor Networks: Contents
Mac Protocols For Wireless Sensor Networks: Contents
Mac Protocols For Wireless Sensor Networks: Contents
NAVEEN RAJA.V
Design goals of a MAC Protocol for Ad-hoc Wireless
Networks
Classifications of MAC Protocols
Contention-Based Protocols
Contention-Based Protocols with reservation Mechanisms
Contention-Based MAC Protocols with Scheduling Mechanisms 1
NAVEEN RAJA.V
available bandwidth, and that the bandwidth is utilized
efficiently.
Characteristics of the wireless medium are completely
different from wired medium.
So a different set of protocols is required for controlling
access to the shared medium in such networks. This is
2
achieved by using Medium Access Control (MAC)
protocol.
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Bandwidth Efficiency:
Since the radio spectrum is limited, the bandwidth available for
communication is also very limited. The MAC protocol must be
designed in such a way that to maximize this bandwidth
efficiency (the ratio of the bandwidth used for actual data
transmission to the total available bandwidth).
That is the uncommon bandwidth is utilized in an efficient
NAVEEN RAJA.V
manner.
Quality of Service Support(QoS):
Providing QoS support to data sessions in Ad-hoc networks is
very difficult due to their characteristic nature of nodes mobility.
Most of the time, Bandwidth reservation made at one point of
time may become invalid once the node moves out of the region.
The MAC protocol for Ad-hoc wireless networks that are to be
3
used in such real-time applications must have resource
reservation mechanism take care of nature of the wireless
channel and the mobility of nodes.
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Synchronization:
The MAC protocol must take into consideration the
synchronization between nodes in the network.
Synchronization is very important for bandwidth (time slot)
reservations by nodes achieved by exchange of control packets.
Hidden and Exposed Terminal Problems:
The hidden terminal problem refers to the collision of packets at
NAVEEN RAJA.V
a receiving node due to the simultaneous transmission of those
nodes.
The exposed terminal problem refers to the inability of a node,
which is blocked due to transmission by a nearby transmitting
node, to transmit to another node.
Mobility of Nodes:
This is a very important factor affecting the performance
4
(throughput) of the protocol.
The MAC protocol obviously has no role to play in influencing the
mobility of the nodes.
Issues in Designing MAC Protocol for Ad-hoc
Wireless Networks:
Error-Prone Shared Broadcast Channel:
Due to broadcast nature of the radio channel (transmissions
made by a node are received by all nodes within its direct
transmission range) there is a possibility of packet collisions is
quite high in wireless networks.
A MAC protocol should grant channel access to nodes in such a
NAVEEN RAJA.V
manner that collisions are minimized.
NAVEEN RAJA.V
nodes.
Control overhead must be kept as low as possible.
The protocol should minimize the effects of hidden and exposed
terminal problems.
The protocol must be scalable to large networks.
It should have power control mechanisms.
The protocol should have mechanisms for adaptive data rate
control.
6
It should try to use directional antennas.
The protocol should provide synchronization among nodes.
Classifications of MAC Protocols:
Ad hoc network MAC protocols can be classified into three types:
Contention-based protocols
Contention-based protocols with reservation mechanisms
Contention-based protocols with scheduling mechanisms
Other MAC protocols
NAVEEN RAJA.V
7
Classifications of MAC Protocols:
Contention-based protocols:
Sender-initiated protocols: Packet transmissions are initiated
by the sender node.
Single-channel sender-initiated protocols: A node that
wins the contention to the channel can make use of the
entire bandwidth.
Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
NAVEEN RAJA.V
Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
Contention-based protocols with reservation mechanisms
Synchronous protocols: All nodes need to be synchronized.
Global time synchronization is difficult to achieve.
Asynchronous protocols: These protocols use relative time
information for effecting reservations.
8
Classifications of MAC Protocols:
NAVEEN RAJA.V
Some scheduling schemes also consider battery
characteristics.
9
Classifications of MAC Protocols:
Contention-based protocols :
Single-channel sender-initiated protocols:
EXAMPLES: MACAW, FAMA
MACAW: A Media Access Protocol for Wireless LANs is based on
MACA (Multiple Access Collision Avoidance) Protocol
MACA:-
When a node wants to transmit a data packet, it
first transmit a RTS (Request To Send) frame.
NAVEEN RAJA.V
The receiver node, on receiving the RTS packet,
if it is ready to receive the data packet,
transmits a CTS (Clear to Send) packet.
Once the sender receives the CTS packet
without any error, it starts transmitting the
data packet.
If a packet transmitted by a node is lost, the
node uses the Binary Exponential Back-off
(BEB) algorithm to back-off a random interval 10
of time before retrying. The problem is solved
by MACAW
Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
MACA EXAMPLES:
MACA avoids the problem of hidden terminals
A and C want to send to B
A sends RTS first
C waits after receiving
CTS from B
NAVEEN RAJA.V
MACA avoids the problem of exposed terminals
B wants to send to A, C
to another terminal
now C does not have
to wait for it cannot
receive CTS from A
11
Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
MACAW: (MACA for Wireless) is a revision of
MACA.
The sender transmits a RTS (Request To
Send) frame if no nearby station transmits a
RTS.
The receiver replies with a CTS (Clear To
Send) frame.
NAVEEN RAJA.V
Neighbors
o see CTS, then keep quiet.
o see RTS but not CTS, then keep quiet
until the CTS is back to the sender.
The receiver sends an ACK when receiving an
frame.
o Neighbors keep silent until see ACK.
Collisions
o There is no collision detection.
o The senders know collision when they
12
don’t receive CTS.
o They each wait for the exponential back-
off time.
Classifications of MAC Protocols:
Contention-based protocols : …cntd
Single-channel sender-initiated protocols:
FAMA: Floor Acquisition Multiple Access Protocols.
Channel access consists of a carrier-sensing operation and a collision
avoidance
Carrier-sensing by the sender, followed by the RTS-CTS control packet
exchange.
Data transmission to be collision free, the duration of an RTS must be at
least twice the maximum channel propagation delay
Two FAMA protocol variants
NAVEEN RAJA.V
RTS-CTS exchange with no carrier sensing (MACA)
RTS-CTS exchange with non-persistent carrier sensing (FAMA-NTR)
NAVEEN RAJA.V
Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
Dual Busy Tone Multiple Access Protocol (DBTMAP) is an extension of
the BTMA scheme.
a data channel for data packet transmissions
a control channel used for control packet transmissions (RTS
and CTS packets) and also for transmitting the busy tones.
Use two busy tones on the control channel, BTt and BTr.
BTt : indicate that it is transmitting on the data channel
BTr: indicate that it is receiving on the data channel 14
Two busy tone signals are two sine waves at different
frequencies
Classifications of MAC Protocols:
Contention-based protocols : …cntd
Receiver-initiated protocols:
RI-BTMA: Receiver-Initiated Busy Tone Multiple Access Protocol
The transmission channel is split into two:
• a data channel for data packet transmissions
• a control channel used for transmitting the busy tone signal
A node can transmit on the data channel only if it finds the
busy tone to be absent on the control channel.
NAVEEN RAJA.V
The data packet is divided into two portions: a preamble and
the actual data packet.
MACA-BI: MACA-By Invitation
By eliminating the need for the RTS packet it reduces the
number of control packets used in the MACA protocol which
uses the three-way handshake mechanism.
MARCH: Media Access with Reduced Handshake.
15
Classifications of MAC Protocols:
Contention-based protocols : …cntd
Receiver-initiated protocols:
NAVEEN RAJA.V
16
Classifications of MAC Protocols:
Contention-based Protocols with Reservation Mechanism:
Contention occurs during the resource (bandwidth) reservation
phase.
Once the bandwidth is reserved, the node gets exclusive access to the
reserved bandwidth.
QoS support can be provided for real-time traffic.
Synchronous protocols:
Distributed Packet Reservation Multiple Access Protocol(D-
PRMA)
NAVEEN RAJA.V
It extends the centralized packet reservation multiple access
(PRMA) scheme into a distributed scheme that can be used in ad
hoc wireless networks.
PRMA was designed in a wireless LAN with a base station.
D-PRMA is a TDMA-based scheme. The channel is divided into
fixed- and equal-sized frames along the time axis.
17
Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Collision Avoidance Time Allocation Protocol(CATA):
Support broadcast, unicast, and multicast transmissions
simultaneously.
Each frame consists of S slots and each slot is further divided into
five Control Mini-Slots
CMS1: Slot Reservation (SR)
CMS2: RTS
NAVEEN RAJA.V
CMS3: CTS
CMS4: Not To Send (NTS)
DMS: Data transmission
18
Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Hop Reservation Multiple Access Protocol (HRMA):
A multichannel MAC protocol which is based on half-duplex, very
slow frequency-hopping spread spectrum (FHSS) radios
Uses a reservation and handshake mechanism to enable a pair of
communicating nodes to reserve a frequency hop, thereby
guaranteeing collision-free data transmission.
NAVEEN RAJA.V
Can be viewed as a time slot reservation protocol where each time
slot is assigned a separate frequency channel.
19
Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
Soft Reservation Multiple Access with Priority Assignment
(SRMA/PA):
Developed with the main objective of supporting integrated
services of real-time and non-real-time application in Ad-hoc
networks.
Nodes use a collision-avoidance handshake mechanism and a soft
reservation mechanism.
Five-Phase Reservation Protocol (FPRP)
NAVEEN RAJA.V
A single-channel TDMA based broadcast scheduling protocol.
Nodes uses a contention mechanism in order to acquire time slots.
The protocol assumes the availability of global time at all nodes.
The reservation takes five phases:
Reservation,
Collision Report,
Reservation Confirmation, 20
Reservation Acknowledgement,
Packing And Elimination Phase.
Classifications of MAC Protocols: …cntd
Contention-based Protocols with Reservation Mechanism:
Synchronous protocols:
NAVEEN RAJA.V
broadcasts a CR packet
NAVEEN RAJA.V
Real-Time Medium Access Control Protocol (RTMAC)
Provides a bandwidth reservation mechanism for supporting real-
time traffic in ad-hoc wireless networks
RTMAC has two components
A MAC layer protocol is a real-time extension of the IEEE 802.11
DCF.
o A medium-access protocol for best-effort traffic
o A reservation protocol for real-time traffic 22
A QoS routing protocol is responsible for end-to-end reservation
and release of bandwidth resources.
Classifications of MAC Protocols:
Contention-based protocols with Scheduling Mechanism:
Protocols in this category focus on packet scheduling at the
nodes and transmission scheduling of the nodes.
The factors that affects scheduling decisions
• Delay targets of packets
• Traffic load at nodes
• Battery power
NAVEEN RAJA.V
Distributed priority scheduling and medium access in Ad Hoc
Networks present two mechanisms for providing quality of
service (QoS)
• Distributed priority scheduling (DPS) – Piggy-backs the priority
tag of a node’s current and head-of-line packets to the control and
data packets
• Multi-hop coordination – Extends the DPS scheme to carry out
scheduling over multi-hop paths.
23
Classifications of MAC Protocols: …cntd
NAVEEN RAJA.V
Scheme
• Scheduling decisions are made based on the states of
neighboring nodes and feed back from destination nodes
regarding packet losses
• Packets are recorded based on their uniform laxity budgets
(ULBs) and the packet delivery ratios of the flows. The laxity
of a packet is the time remaining before its deadline.
24
Classifications of MAC Protocols:
NAVEEN RAJA.V
• Make use of an RTS/CTS exchange mechanism
• Use directional antennas for transmitting and receiving data
packets
Directional Busy Tone-based MAC Protocol (D-BTMA)
• It uses directional antennas for transmitting the RTS, CTS, data
frames, and the busy tones.
Directional MAC Protocols for Ad Hoc Wireless Networks
• DMAC-1: A directional antenna is used for transmitting RTS
packets and Omni-directional antenna for CTS packets. 25
• DMAC-1, both directional RTS and omni-directional RTS
transmission are used.
Classifications of MAC Protocols: …cntd
NAVEEN RAJA.V
26
Classifications of MAC Protocols: …cntd
Other MAC Protocols:
Multi-channel MAC Protocol (MMAC)
Multiple channels for data transmission
There is no dedicated control channel.
Based on channel usage channels can be classified into three
types: high, medium and low preference channels.
Multi-channel Carrier Sense Multiple Access(MCSMA) MAC
Protocol :
NAVEEN RAJA.V
The available bandwidth is divided into several channels
Power Control MAC Protocol (PCM) for Ad Hoc Networks
Allows nodes to vary their transmission power levels on a per-
packet basis
Receiver-based Autorate Protocol (RBAR)
Use a rate adaptation approach
Interleaved Carrier-Sense Multiple Access Protocol (ICSMA)
The available bandwidth is split into tow equal channels 27
The handshaking process is interleaved between the two
channels.
Note: A directional antenna or beam antenna is an antenna which
radiates or receives greater power in specific directions allowing
for increased performance and reduced interference from
unwanted sources.
NAVEEN RAJA.V
Note: Handshaking is the exchange of information between
two modems and the resulting agreement about which
protocol to use that precedes each telephone connection.
28