MAC protocols. Lecturer: Dmitri A. Moltchanov

Similar documents
MAC protocols for ad hoc networks

UNIT-III MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS

Chapter 6: MAC Protocols for Ad Hoc Wireless Networks. Jang Ping Sheu

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1

IEEE Medium Access Control. Medium Access Control

CSE 461: Wireless Networks

CMPE 257: Wireless and Mobile Networking

SENSOR-MAC CASE STUDY

The MAC layer in wireless networks

CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS

Mohamed Khedr.

The MAC layer in wireless networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

ICE 1332/0715 Mobile Computing (Summer, 2008)

MAC in /20/06

ADHOC NETWORKS. Sub Code : 10IS841/10CS841 IA Marks : 25 Hrs/Week : 04 Exam Hours : 03 Total Hrs : 52 Exam Marks : 100 PART A

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Aloha and slotted aloha

Computer Communication III

CMPE 257: Wireless and Mobile Networking

Multiple Access Links and Protocols

Media Access Control in Ad Hoc Networks

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Rahman 1. Application

CMPE 257: Wireless and Mobile Networking

Lecture 16: QoS and "

A STUDY ON MAC PROTOCOLS FOR WIRELESS AD HOC NETWORK

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Logical Link Control (LLC) Medium Access Control (MAC)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT

VETRI VINAYAHA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING Cs6003-Ad hoc and sensor networks

The Electronic Magazine of Original Peer-Reviewed Survey Articles.

ECEN 5032 Data Networks Medium Access Control Sublayer

Multiple Access Technique. Media Access Control (Intro.) Outline. Multiple Access Technique. Designing Issues of MAC protocols. Protocols examples

MAC LAYER. Murat Demirbas SUNY Buffalo

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Unit 7 Media Access Control (MAC)

Local Area Networks NETW 901

Wireless LANs. ITS 413 Internet Technologies and Applications

CSE 6811 Ashikur Rahman

Wireless Local Area Networks (WLANs) Part I

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

MAC. Fall Data Communications II 1

R N S INSTITUTE OF TECHNOLOGY CHANNASANDRA, BANGALORE - 98 AD HOC NETWORKS SUBJECT CODE: 06IS841 PREPARED BY

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Strengthening Unlicensed Band Wireless Backhaul

Wireless Local Area Networks. Networks: Wireless LANs 1

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Data and Computer Communications. Chapter 13 Wireless LANs

Lecture 9. Quality of Service in ad hoc wireless networks

Wireless MACs: MACAW/802.11

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Embedded Internet and the Internet of Things WS 12/13

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

/99/$10.00 (c) 1999 IEEE

Chapter 12 Multiple Access 12.1

Review of Medium Access Control protocol for MANET

Wireless Networks (CSC-7602) Lecture 6 (08 Oct. 2007) Seung-Jong Park (Jay) Wireless MAC

Wireless & Mobile Networking

Wireless Communications

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Wireless Networked Systems

MSIT 413: Wireless Technologies Week 8

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data Communications. Data Link Layer Protocols Wireless LANs

Subject: Adhoc Networks

A Survey on Modified RTS/CTS Mechanism

Wireless Networking & Mobile Computing

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Multiple Access in Cellular and Systems

Wireless Medium Access Control Protocols

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

CSE 461: Multiple Access Networks. This Lecture

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Medium Access Control protocols for ad hoc wireless networks: A survey

Wireless Local Area Network (IEEE )

Mobile and Sensor Systems

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Wireless LAN -Architecture

EE 122: Ethernet and

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CMPE 257: Wireless and Mobile Networking

On the Performance of Collision Avoidance Protocols in Ad-Hoc Wireless Networks

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

Mobile Communications Chapter 3 : Media Access

Computer Networks. Wireless LANs

Lesson 2-3: The IEEE x MAC Layer

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Tarek Sheltami. CCSE COE 3/8/2008 1

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Transcription:

MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/

OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based protocols Contention-based with reservation mechanism Contention-based with scheduling mechanism MAC protocols for directional antennas Power control MAC protocols Lecture: MAC protocols 2

1. Problems for MAC to deal with Aim of MAC: provide fair access to shared broadcast radio channel. Issues to deal with: Bandwidth efficiency: must be maximized. Real-time traffic support: should be provided. Synchronization: sometimes needed, e.g. TDMA. Shared broadcast medium: collisions must be avoided/minimized. Lack of central coordination: fully distributed MAC design. Lecture: MAC protocols 3

Hidden terminal problem: collisions inefficient bandwidth utilization. packets collision packets hidden terminal receiver sender Figure 1: Illustration of the hidden terminal problems. Lecture: MAC protocols 4

Exposed terminal problem: inability to transmit inefficient bandwidth utilization. packets packets receiver exposed terminal sender receiver Figure 2: Illustration of the exposed terminal problem. Lecture: MAC protocols 5

Mobility of nodes: loss of connectivity; network partitioning; bit errors. t+delta(t) t Figure 3: Network partitioning is one of the biggest problem to deal with at MAC sublayer. Lecture: MAC protocols 6

2. Design goals What we want from MAC protocol: operation of the protocol should be distributed; should support real-time traffic; the access delay must be minimized; available bandwidth must be utilized efficiently; fair bandwidth allocation to competing nodes; control overhead must be minimized; the effects of hidden/exposed terminals must be minimized; must be scalable; should minimize power consumption; should provide synchronization between nodes. Lecture: MAC protocols 7

3. Classification of MAC protocols MAC protocol for ad-hoc networks must be classified into: Contention-based protocols without reservation/scheduling: no reservation of the bandwidth is made; guarantees are not possible. Contention-based protocols with reservation mechanisms: bandwidth for transmission is reserved in advance. guarantees are possible. Contention-based protocols with scheduling mechanisms: distributed scheduling between nodes is used. guarantees are possible. Protocols that do not fall to any of these categories: implement several features of different protocol groups or use completely different approach Lecture: MAC protocols 8

MAC protocols for ad-hoc networks Contention-based Reservation Scheduling Other sender initiated receiver initiated - RI-BTMA; - MACA-BI; - MARCH. - DPS; - DWOP; - DLPS. - MMAC; - MCSMA; - PCM; - RBAR. synchronous asynchronous single channel - MACAW; - FAMA. multiple channel - BTMA; - DBTMA; - ICSMA. - D-PRMA; - CATA; - HRMA; - SRMA/PA; - FPRP. - MACA/PR; - RTMAC. Lecture: MAC protocols 9

4. Contention based protocols w/o reservation/scheduling The basic idea: do your best to not cause a collision. 4.1. MACA protocol MACA is based on CSMA/CA that operates as follows: the sender sense the channel for the carrier signal; if the carrier is present it retries to sense the channel after some time (exp. back-off); if not, the sender transmits a packet. The following shortcomings are inherent to CSMA/CA: : hidden terminal problem leading to frequent collisions; : exposed terminal problem leading to worse bandwidth utilization. To avoid it: virtual carrier sensing; RTS-CTS handshake before transmission. Lecture: MAC protocols 10

Neighbor Sender Receiver Neighbor RTS RTS CTS CTS Data Data ACK ACK Figure 4: Packet transmission in MACA. Lecture: MAC protocols 11

NEIGHBOR BACK-OFF RTS DATA SENDER CTS ACK REVEIVER BACK-OFF NEIGHBOR NAV FROM RTS NAV FROM CTS NAV FROM DATA Figure 5: Usage of virtual carrier sensing. NAV: network allocation vector implementation of virtual carrier sensing. Lecture: MAC protocols 12

If the transmission fails: contention window: CW 2 (multiplicative increase, immediate decrease); retransmission. 31 63 127 255 511 1023 slots initial 1st 2nd 3rd 4th 5th Figure 6: Evolution of the contention window with increasing of transmission attempts. Lecture: MAC protocols 13

Problem 1 of MACA: starvation of flows: both S1 and S2 have the high volume of traffic, S1 seizes the channel first; packets transmitted by S2 get collided and it doubles CW (CW = 2CW ); the probability that the node S2 seizes the channel is decreasing. S1 R S2 Figure 7: Starvation of the flow from S2. Solution: the packet header contains the field set to the current back-off value of the transmitting node; a node receiving this packet copies this value to its back-off counter (fairness); CW = CW min after every successful transmission. Lecture: MAC protocols 14

Problem 2 of MACA: fast adjustment of CW: when a node successfully transmits a packet; when a collisions is detected by a node. S1 R S2 S1 BACKOFF CW=511 RECEIVER S2 BACKOFF CW=511 RTS CTS DATA ACK BACKOFF CW=CW min Figure 8: Rapid adjustments of the CW. Solution: multiplicative increase when collision, linear decrease when success. Lecture: MAC protocols 15

Problem 3 of MACA: an exposed node is free to transmit. ongoing transmission S1-R1; node S2 hears RTS but not CTS (exposed node); S2 initiates transfer to R2; DATA from S1 and CTS from R2 may collide, CW unnecessary increases at S2. R1 RTS CTS DATA DATA CTS S1 S2 R2 RTS RTS Figure 9: Problems with exposed node. Solution: use of small data sending packet (DS) to update information. Lecture: MAC protocols 16

4.2. Busy tone multiple access protocol (BTMA) Multichannel protocol where the channel is separated into: control channel: used for data transmission; data channel: used for busy tone transmission. BTMA works as follows: a node senses the control channel to check whether the busy tone is active; if not, it turns on the busy tone signal and starts data transmission; if yes, a node waits for a random period of time and repeats the procedure; any node that senses the carrier on the incoming data channel also transmits a busy tone. There are following advantages are shortcoming of the BTMA: +: simple enough; +: probability of collision is extremely low; : bandwidth utilization is low (nodes are blocked in two-hop neighborhood). Lecture: MAC protocols 17

4.3. MACA by invitation (MACA-BI) Receiver-initiated MAC protocol providing the following extension to MACA: MACA: RTS-CTS-DATA-ACK; MACA-BI eliminates the need for CTS using the receiver s ready-to-receive (RTR) packet. Sender Receiver Neighbor RTR RTR DATA Figure 10: Transmission in MACA-BI. needs information about the traffic at neighboring nodes; this information is included into DATA packets. Lecture: MAC protocols 18

4.4. Media access with reduced handshake (MARCH) RTS packet is used only for the first DATA packet of the stream: nodes know about packet arrival at neighboring node listening to CTS signals; to relay packet, it sends a CTS packet to the concerned node. node 1 node 2 node 3 RTS node 4 CTS CTS DATA CTS CTS DATA CTS Chain relaying DATA Figure 11: Relaying using the MARCH. Lecture: MAC protocols 19

The CTS packet in MARCH carries the following information: the MAC address of the sender and the receiver node; route identification number R id to distinguish between routes. Route 1: A-B-C-D-E Route 2: X-C-Y X A B C D E Y MARCH is characterized by the following advantages and shortcomings: +: very high throughput; +: very low control overhead; : access to routing information is required cross-layering! Lecture: MAC protocols 20

5. Contention-based protocols with reservations Use bandwidth reservation techniques: contention occurs here only at resource reservation phase; once bandwidth is reserved a node gets an exclusive access to the media. 5.1. Distributed packet reservation multiple access protocol (D-PRMA) D-PRMA is a TDMA based scheme where the channel is divided into frames. Frame length... Slot 1 Slot 2 Slot n Minislot 1 Minislot 2 Minislot m RTS/BI CTS/BI DATA Figure 12: Frame structure in D-PRMA. Lecture: MAC protocols 21

Slot reservation and overcoming the hidden terminal problem: Request to send / busy indication (RTS/BI) and clear to send / busy indication (CTS/BI). The protocol operates as follows: nodes having a packet for transmission contend in the first minislot of each slot; the remaining (m 1) minislots in the slot are granted to the node that wins the contention; the same slot in subsequent frames is reserved for the this terminal, until it ends transmission; if no node wins the first minislot, the remaining minislots subsequently used for contention; within a reserved slot communication is performed using TDD or FDD. Slot reservation mechanism performs as follows: a certain period in the beginning of each minislot is reserved for carrier-sensing; if a nodes detects a channel to be idle, it sends a RTS packet to destination using RTS/BI; receiver answers with CTS packets in the CTS/BI field of the same minislot; the sender upon receiving CTS, gets a reservation for current slot (all minislots). Lecture: MAC protocols 22

To prioritize the voice traffic: Rule 1: voice nodes traffic are allowed to start contention from minislot 1 with probability 1. data nodes start contention from minislot 1 with probability < 1; for the remaining (m 1) minislots all nodes contend with probability 1. Rule 2: if the node winning the contention is the data node, only the current slot is reserved; if the node winning the contention is the voice node, subsequent slots are also reserved. To make it real the following requirements must be satisfied: Requirements for nodes other than a winning one: hidden and exposed terminals should be avoided; no contention: no contention in remaining minislots; no contention in the subsequent slots. Lecture: MAC protocols 23

Requirement 1: (no contention in other minislots) Hidden terminal problem: RTS packet do not suffer a collision due to carrier sensing (winning node transmits); a node hearing the CTS is not allowed to transmit in the remaining period of the slot. Exposed terminal problem: A node hearing the RTS but not CTS is allowed to transmit. Requirement 2: (no contention in other slots) the receiver and sender transmit a BI signal in minislot 1 of the reserved slot; when any node hears BI signal it does not contend in this slot; when the transmission is completed both sides stops transmission of BI signal. Advantages and shortcomings: +: D-PRMA is best suited for voice applications; : requires synchronization (TDMA). Lecture: MAC protocols 24

6. Contention-based protocols with scheduling mechanisms Aim is on transmission scheduling at nodes considering metrics: delay targets of packets; traffic load at nodes; remaining battery power at nodes, etc. 6.1. Distributed priority scheduling (DPS) This protocols is primarily based on IEEE 802.11 DCF using RTS-CTS-DATA-ACK mechanism. The communication is as follows: RTS packet transmitted by a node carries priority index of the packet (delay, etc.); the receiver responds with CTS containing the priority tag and source ID copied from RTS; neighbors retrieve this information from RTS and CTS and make entry in scheduling tables; source sends DATA and receiver responds with ACK; after DATA and ACK is transmitted neighbor updates their scheduling tables. Lecture: MAC protocols 25

S D P 6 7 2 S D P 6 7 2 1 2 7 S D P 6 7 2 RTS DATA Node 3 (neighbor to node 1) RTS CTS DATA ACK Node 1 RTS CTS DATA ACK Node 2 CTS ACK Node 4 (neighbor to node 2) S D P S D P S D P 5 6 5 5 6 5 5 6 5 1 2 7 Figure 13: Packet exchange and scheduling tables update in DPS. Lecture: MAC protocols 26

7. MAC protocols for directional antennas The following advantages can be achieved using the directional antennas: reduced signal interference; increase in system throughput; improved channel reuse. 7.1. MACA for directional antennas For this protocol the following assumptions are used: each node has only one radio transceiver; transceiver is equipped with M directional antennas; each antenna covers angle 2π/M; transmissions by adjacent antennas never overlap; MAC layer is able to switch antennas individually or all antennas together. Packet transmission is made using RTS-CTS-DATA-ACK. Lecture: MAC protocols 27

RTS CTS DATA Figure 14: Packet transmission using directional antennas. The main problem is to determine the direction of each other: idle node listens on all antennas; the sender transmits RTS using omnidirectional transmission; the receiver responses with CTS using omnidirectional transmission; both determines the antennas with the highest quality of the signal and switch them up. Lecture: MAC protocols 28

7.2. Directional busy tone based MAC protocol The major features of this protocol are as follows: it uses directional antenna consisting of N elements; for broadcast all elements are used; for unicast only one element is used; when a node is idle all elements sensing the channel; while receiving only one element receives the signal. It operates as follows: a node senses the channel for presence of receiver busy tone (BT r ); if BT t is not active, it sends RTS on all antennas elements; the receiver receives RTS and makes sure that BT t is not present; then, the receiver transmits CTS directionally to the sender and turn on the BT r ; the sender turns on the BT t and sends the DATA packet. Lecture: MAC protocols 29

8. Power control MAC protocol This protocol allows to vary a transmission range of nodes on a per-packet basis. There are two modes of operation: BASIC protocol; PCM protocol. The BASIC protocol operates as follows: RTS and CTS packets are transmitted using the maximum power p max ; RTS-CTS packets are used to decide necessary transmission power for DATA and ACK packets: Method 1: The receiver send CTS with estimated transmitted level p d < p max ; Method 2: CTS is sent back using p max and the source calculates p d based on p max : where Rx th is the minimum required power and c is a constant p r is the received signal strength. p d = p max p r Rx th c, (1) Lecture: MAC protocols 30

C RTS sensing RTS DATA A ACK B CTS D CTS sensing Node C sense carrier of RTS but not CTS; Node D sense carrier of CTS but not RTS; Both waits for extended IFS: - C packet may collide with ACK; - D packet may collide with DATA. Solution: increase power to p max during DATA packet transmission: p max p d DATA packet Figure 15: The major problem associated with BASIC protocol. Lecture: MAC protocols 31