0% found this document useful (0 votes)
65 views

Chapter One: Introduction

The document discusses MAC protocols for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and their applications and challenges. These include the wireless medium being unreliable, dynamic topology changes, and hidden and exposed terminal problems. The goals of MAC protocols for MANETs are discussed, such as distributed operation, quality of service support, and efficiency. MAC protocols are classified as contention-based, contention-based with reservation mechanisms, contention-based with scheduling mechanisms, and other protocols. Contention-based protocols, which do not guarantee bandwidth, are described in more detail.

Uploaded by

beetelnuts
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Chapter One: Introduction

The document discusses MAC protocols for mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and their applications and challenges. These include the wireless medium being unreliable, dynamic topology changes, and hidden and exposed terminal problems. The goals of MAC protocols for MANETs are discussed, such as distributed operation, quality of service support, and efficiency. MAC protocols are classified as contention-based, contention-based with reservation mechanisms, contention-based with scheduling mechanisms, and other protocols. Contention-based protocols, which do not guarantee bandwidth, are described in more detail.

Uploaded by

beetelnuts
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 14

CONTENTS

Chapter One : Introduction 1.1 MANETS.....................................07 1.2 Applications..............................................................07 1.3 Challenges in MANETS................................08 Chapter Two : MAC Protocols for MANETS 2.1 Media Access Control.......................................0 2.2 !ss"es...........................0 2.2.1 #idden $ E%posed ter&inal pro'le&......................................................10 2.3 (oals......................................................11 2.) Classi*ications.....................................................................................................12 2.).1 Contention 'ased protocols...................................................................12 2.).2 Contention 'ased protocols +ith reser,ation &echanis&.....................1) 2.).2 Contention 'ased protocols +ith sched"ling &echanis&.....................1) 2.).3 -ther MAC protocols.............................................................................1. Conclusion..1/ References..17

[6

Chapter ! : INTRO"#CTION
!$! MANETS

1. A &o'ile ad0hoc net+or1 2MANET3 is *or&ed '4 a cl"ster o* &o'ile hosts +itho"t the in*rastr"ct"re o* 'ase stations. 5"e to the trans&ission range constraint *or a transcei,er6 t+o &o'ilehosts &a4 co&&"nicate +ith each other either directl46 i* the4 are close eno"gh6 or indirectl46 '4 ha,ing other inter&ediate &o'ile hosts rela4 their pac1ets. Since no 'ase station is re7"ired6 one o* its &ain ad,antages is that it can 'e rapidl4 deplo4ed. The applications o* MANETs appear in places +here pre0deplo4&ent o* net+or1 in*rastr"ct"re is di**ic"lt or "na,aila'le 2e.g.6 *leets in oceans6 ar&ies in &arch6 nat"ral disasters6 'attle *ields6 *esti,al *ield gro"nds6 and historicsites3. 2. !n Single hop +ireless connecti,it4 to the +ired +orld the space is di,ided into cells. A 'ase station is responsi'le to co&&"nicate +ith hosts in its cell. Mo'ile hosts can change cells +hile co&&"nicating. #and o** occ"rs +hen a &o'ile host starts co&&"nicating ,ia a ne+ 'ase station. 8hile in a M"lti0#op 8ireless connecti,it4 &a4 need to tra,erse &"ltiple lin1s to reach destination . The &o'ilit4 ca"ses ro"te to change. 3. !n MANETS 6 +e cater *or sit"ations +here the host &o,e&ent and topolog4 change is *re7"ent. There is no cell"lar in*rastr"ct"re and it "ses &"lti hop +ireless connecti,it4. The data are ro"ted ,ia inter&ediate nodes. ). Setting "p o* *i%ed access points and 'ac1'one in*rastr"ct"re is not al+a4s ,ia'le. !n*rastr"ct"re &a4 not 'e present in a disaster area or +ar 9one and &a4 not 'e practical *or short range radios 2:l"etooth 2range ; 10&33. Ad hoc net+or1s do not need 'ac1'one in*rastr"ct"re s"pport and are eas4 to deplo4. The4 are "se*"l +hen in*rastr"ct"re is a'sent6 destro4ed or i&practical.

!$%
1. 2. 3. ).

Applications
<ersonal area net+or1ing s"ch as cell phone6 laptop6 ear phone6 +rist +atch Militar4 en,iron&ents li1e in soldiers6 tan1s6 planes. Ci,ilian en,iron&ents s"ch as in ta%i ca' net+or16 &eeting roo&s6 sports stadi"&s6 'oats6 s&all aircra*ts. E&ergenc4 operations li1e in search and resc"e operations and policing and *ire *ighting. [&

!$'

Challen(es in MANETS

1.

As it is a +ireless net+or1 it inherits the traditional pro'le& o* +ireless net+or1ing: 2a3 The channel is "nprotected *ro& o"tside signal. 2'3 The +ireless &edia is "nrelia'le as co&pared to the +ired &edia. 2c3 #idden ter&inal and e%pose ter&inal pheno&enon &a4 occ"r. 2d3 The channel has ti&e ,ar4ing and as4&&etric propagation properties

2.

There are so&e other challenges and co&ple%ities: 2a3 The scala'ilit4 is re7"ired in MANET as it is "sed in &ilitar4 co&n6 'eca"se the net+or1 gro+s according to the need6so each&o'ile de,ice &"st 'e capa'le to handle the intensi*ication o* net+or1 and to acco&plish the tas1. 2'3 MANET is a in*rastr"ct"re less net+or16 there is no central ad&inistration. Each de,ice can co&&"nicate +ith e,er4 other de,ice6 hence it 'eco&es di**ic"lt to detect and &anage the *a"lts. !n MANET6 the &o'ile de,ices can &o,e rando&l4. The "se o* this d4na&ic topolog4 res"lts in ro"techanges6 *re7"ent net+or1 partitions and possi'l4 pac1et losses . 2c3 Each node in the net+or1 is a"tono&o"s= hence ha,e the e7"ip&ent *or radio inter*ace +ith di**erent trans&ission$ recei,ing capa'ilities these res"lts in as4&&etric lin1s. MANET "ses no ro"ter in 'et+een. 2d3 !n net+or1 e,er4 node acts as a ro"ter and can *or+ard pac1ets o* data other nodes to pro,ide in*or&ation parta1ing a&ong the &o'ile nodes. to

2e3 5i**ic"lt chore to i&ple&ent ad hoc addressing sche&e6 the MAC address o* the de,ice is "sed in the stand alone ad hoc net+or1. #o+e,er e,er4 application is 'ased on TC<$!< and >5<$!<.

[)

Chapter % : MAC Protocols for MANETS


%$! Media Access Control

1. A MAC 2&edi"& access control3 protocol is "sed to resol,e the potential contention and collision +hen "sing the co&&"nication &edi"&. !ts &ain ai& is to pro,ide *air access to shared 'roadcast radio channel. 2. Man4 MAC protocols ha,e 'een proposed *or +ireless net+or1s 6 +here a co&&on channel is ass"&ed to 'e shared '4 &o'ile hosts. 8e call s"ch protocols single0 channel MAC protocols. A standard that has 'een +idel4 accepted 'ased on the single0 channel &odel is the !EEE 802.11 . -ne co&&on pro'le& +ith s"ch protocols is that the net+or1 per*or&ance +ill degrade 7"ic1l4 as the n"&'er o* &o'ile hosts increases6 d"e to higher contention$collision.

%$%

Issues

1. *andwidth efficienc+ : !t is de*ined at the ratio o* the 'and+idth "sed *or act"al data trans&ission to the total a,aila'le 'and+idth. The MAC protocol *or ad0hoc net+or1s sho"ld &a%i&i9e it. 2. ,ualit+ of ser-ice s"pport is essential *or ti&e0critical applications. The MAC protocol *or ad0hoc net+or1s sho"ld consider the constraint o* ad0hoc net+or1s. 3. ). .. /. 7. S+nchroni.ation can 'e achie,ed '4 e%change o* control pac1ets. /idden and e0posed ter1inal pro2le1s$ Error3Prone Shared *roadcast Channel "istri2uted Nature45ac6 of Central Coordination Mo2ilit+ of Nodes: Nodes are &o'ile &ost o* the ti&e.

[7

%$%$!

/idden and E0posed Ter1inal Pro2le1

1. The radio inter*ace o* each node "ses 'roadcasting and copies +ith li&ited +ireless trans&ission range. Collisions and higher pro'a'ilit4 o* pac1et losses d"e to trans&ission errors are also speci*ics o* the +ireless &edi"&. The4 &a4 se,erel4 red"ce the channel "tili9ation and thro"ghp"t. The hidden and e%posed ter&inal pro'le& are a&ong the &ost re&ar1a'le pro'le&s posed in *ront o* thr CSMA$ CA 'ased MAC la4er design. 2. The hidden ter&inal pro'le& occ"rs +hen t+o or &ore ter&inals 6 +hich ha,e dis?oint trans&ission ranges start trans&itting to+ards the sa&e recie,er 2 eg. Node A and node C are dis?oint nodes trans&itting to+ards node :3. This res"lts in pac1et collision.

3. The e%posed ter&inal pro'le& occ"rs +hen a node 2 eg. Node C3 that *alls into the trans&ission range o* an acti,e node 2 eg. Node : trans&its to node A 3 +ants to start a trans&ission to another inacti,e node +ithin its range 6 '"t o"tside the range o* the acti,e node 2 eg. Node C +ants to trans&it to node 5 3 . According to the CSMA sche&e 6 the node has to postpone the trans&ission 6 +hich res"lts in thro"ghp"t decrease.

[!8

%$'
1. 2.

9oals
The operation o* the protocol sho"ld 'e distri'"ted. The protocol sho"ld pro,ide @oS s"pport *or real0ti&e tra**ic.

3. The access dela46 +hich re*ers to the a,erage dela4 e%perienced '4 an4 pac1et to get trans&itted6 &"st 'e 1ept lo+. ). .. /. The a,aila'le 'and+idth &"st 'e "tili9ed e**icientl4. The protocol sho"ld ens"re *air allocation o* 'and+idth to nodes. Control o,erhead &"st 'e 1ept as lo+ as possi'le.

7. The protocol sho"ld &ini&i9e the e**ects o* hidden and e%posed ter&inal pro'le&s. 8. . 10. 11. 12. The protocol &"st 'e scala'le to large net+or1s. !t sho"ld ha,e po+er control &echanis&s. The protocol sho"ld ha,e &echanis&s *or adapti,e data rate control. !t sho"ld tr4 to "se directional antennas. The protocol sho"ld pro,ide s4nchroni9ation a&ong nodes.

[!!

%$:

Classifications$

1. Medi"& access approaches can 'e contention0'ased and contention *ree. The &ost co&&onl4 considered contention 'ased approach is CSMA$ CA 2 carrier sense &"ltiple access +ith collision a,oidance3 and the &ost co&&onl4 considered contention *ree approach is T5MA 2 ti&e di,ision &"ltiple access3. 2. 8e in this pro?ect consider contention 'ased &edi"& access control. Collision a,oidance is an i&portant iss"e in this. Contention 'ased adhoc +ireless net+or1ing protocols can 'e classi*ied into : 2a3 2'3 2c3 2d3 Contention 'ased protocols. Contention 'ased protocols +ith reser,ation &echanis&s. Contention 'ased protocols +ith sched"ling &echanis&s. -ther protocols.

%$:$!

Contention 2ased protocols

1. Contention 'ased protocols do not ha,e an4 'and+idth reser,ation &echanis&s and *ollo+ a contention 'ase channel access polic4 . All nodes contend *or the channel si&"ltaneosl4 and the +inning node gains the access to the channel. The contention 'ased protocols can ha,e a carrier sensing operations and $or colllision a,oidance dialog 'et+een the sender and the intended recie,er. There is no 'and+idth g"arantee6 +hich &a1es these protocols in appropriate *or trans&itting real ti&e tra**ic and ena'ling @oS g"aranties. 2. The4 can 'e sender initiated 2 sender initiate pac1et trans&ission 6 eg. MACA8 6 AAMA 3 or recie,er initiated 2 recie,er initiate contention resol"tion protocol6 eg. MACA 0:! 6 MABC#3. Sender initiated protocols can 'e single channel or &"lti channel . !n single0channel6 a node that +ins the contention to the channel can &a1e "se o* the entire 'and+idth. !n &"lti channel 6 the a,aila'le 'and+idth is di,ided into &"ltiple channels depending "pon ho+ &"ch a,aila'le 'and+idth is act"all4 "sed.

[!%

3. >sing &"ltiple channels has se,eral ad,antages. Airst6 +hile the &a%i&"& thro"ghp"t o* a single0channel MAC protocol +ill 'e li&ited '4 the 'and+idth o* the channel6 the thro"ghp"t &a4 'e increased i&&ediatel4 i* a host is allo+ed to "tili9e &"ltiple channels. Aor e%a&ple6 there are 3 or ) non0o,erlapping channels in !EEE 802.11'. !* onl4 one channel is "sed6 the total thro"ghp"t +ill 'e li&ited. Second6 "sing &"ltiple channels +ill e%perience less nor&ali9ed propagation dela4 per channel than the single0channel co"nterparts6 +here the nor&ali9ed propagation dela4 is de*ined to 'e the ratio o* the propagation ti&e o,er the pac1et trans&ission ti&e. There*ore6this red"ces the pro'a'ilit4 o* collisions. ). !n +ireless ad hoc net+or1s that rel4 "pon a carrier sensing rando& access approach 2eg. 802.11 5CA3 6 appropriate sol"tion to hidden ter&inal pro'le& has to 'e *o"nd. According to 5CA 6 the station &"st sense the channel 'e*ore starting its o+n trans&ission . !* the &edi"& is *o"nd idle *or an inter,al longer than distri'"ti,e inter *ra&e space 25!AS3 6 the station starts the trans&ission6 other+ise the station &"st contin"e &onitoring the &edi"& "ntil it is *o"nd idle &ore than a 5!AS period. Then the station +aits *or a rando& 'ac1 o** inter,al. A*ter the rando& 'ac1 o* inter,al e%pires6 the station starts trans&ission 6 '"t onl4 i* the &edi"& is sensed *ree. !* the &edi"& is sensed '"s46 'ac1 o** proced"re is in,o1ed again +hich is i&ple&ented "sing &an4 &edis access protocols. .. The hidden ter&inal pro'le& can 'e red"ced '4 e%tending the 5CA 'asic &echanis& thro"gh a ,irt"al carrier sensing. The trans&ission phase is preceded +ith t+o control *ra&es 6 BTS and CTS6 to anno"nce the "pco&ing *ra&e trans&ission to the recie,er and to indicate recie,erCs readines to recie,e the data *ra&es. This handsha1ing dialog generall4 red"ces the collisions and i&pro,es the s4ste& per*or&ances 6 '"t introd"ces so&e dela4 and o,erheads. !* ac1no+ledge&ent &echanis& is i&ple&ented6 then the recie,ing station sends the ac1 *ra&e 2ACD3 a*ter s"ccess*"l reception o* data *ra&e and +aiting *or a short inter *ra&e space 2S!AS3 inter,al. /. So&e e%a&ples o* contention 'ased MAC protocol are AAMA 6 :TMA 6 MACA0:! . MACA 6 MACA8 6

[!'

%$:$%

Contention ; 2ased protocols with reser-ation 1echanis1

1. These are &ostl4 'ased on T5MA philosoph4 and i&ple&ent &echanis&s *or reser,ing 'and+idth in order to s"pport real ti&e tra**ic and pro,ide @oS g"arantees. The4 can re7"ire s4nchroni9ation a&ong all nodes in the net+or1 2 S4nchrono"s protocols3 or "se relati,e ti&e in*or&ation *or e**ecting reser,ations 2 As4nchrono"s protocols3. 2. Contention occ"rs d"ring the reso"rce 2'and+idth3 reser,ation phase. -nce the 'and+idth is reser,ed6 the node gets e%cl"si,e access to the reser,ed 'and+idth. -ne o* the e%a&ple is 50<BMA 2 5istri'"ted pac1et reser,ation &"ltiple access3. 3. 5istri'"ted pac1et reser,ation &"ltiple access protocol 250<BMA3 e%tends the centrali9ed pac1et reser,ation &"ltiple access 2<BMA3 sche&e into a distri'"ted sche&e that can 'e "sed in ad hoc +ireless net+or1s. <BMA +as designed in a +ireless EAN +ith a 'ase station. 50<BMA e%tends <BMA protocol in a +ireless EAN. 50<BMA is a T5MA 'ased sche&e. The channel is di,ided into *i%ed and e7"al0si9ed *ra&es along the ti&e a%is. ). BTS$:! 2 '"s4 indication3 and CTS$:! *ields "sed to place the re7"ire&ents and a,oid hidden ter&inal pro'le&. .. So&e e%a&ples o* contention 'ased protocols +ith reser,ation &echanis&s are 50<BMA6 CATA6 #BMA 6 MACA$<B .

%$:$'

Contention ; 2ased protocols with schedulin( 1echanis1

1. !t *oc"s on nodes channel access trans&ission sched"ling 6 pro,iding *air treat&ent o* all nodes and on pac1et sched"ling en*orcing priorities 'et+een di**erent pac1et *lo+s . These &echanis&s can ta1e into consideration ,ario"s *actors that can in*l"ence net+or1 per*or&ance li1e 6 re&aining 'atter4 po+er at nodes 6 pac1et dela4 6 tra**ic load 6 etc. 2. Most o* these protocols are 'ased on t+o 'asic sche&es : distri'"ted priorit4 sched"ling 25<S3 and &"ltihop coordination. The 5<S is 'ased on the !EEE 802.11 distri'"ted coordination *"nction &echanis&s co&'ined +ith pigg4'ac1ing the priorit4 in*or&ation on BTS$ CTS$ 5ATA$ ACD pac1ets. The trans&itting pac1ets "pdate the sched"ling ta'le +ith priorit4 tags 6 &ar1ing each so"rce F destination pair. Each nodeCs sched"ling ta'le gi,es the ran1 o* the node +.r.t other nodes in the neigh'orhood. [!:

3. M"lti hop sche&es 'alance the priorit4 inde% 'et+een "p0stre& and do+n0 strea& pac1ets achie,ing 'etter end to end dela4 per*or&ance. These sche&es can "tili9e the ti&e sensiti,e tra**ic on adhoc +ireless net+or1s. ). Gariations o* these &echanis&s in di**erent sched"ling MAC protocols 6 s"ch as 58-< and 5E<S. Adapti,e approach and co&'ination +ith other techni7"es can *"rther enhance the possi'iliies *or corrections in end to end dela4 and @oS.

%$:$:

Other MAC protocols

1. There are n"&'er o* MAC protocols that cannot 'e strictl4 classi*ied into pre,io"sl4 &entioned categories. 2. There are MAC protocols that "se directional antennas to i&pro,e the thro"ghp"t and directional '"s4 tone 'ase MAC protocol that i&pro,es the spectral re"se and increase the channel capacit4. 3. Another i&portant gro"p o* MAC protocols are po+er control protocols.

). There are protocols that deals +ith &"ltihop connections and resol,e the "se o* &"ltiple channels *or data trans&ission 2MMAC3.

[!<

CONC5#SION
1. MAC la4er &echanis&s are responsi'le *or the nodesC access to the channel and a**ect the o,erall net+or1 per*or&ances. Earge n"&'er o* proposed protocils is '"ilt "p "pon di**erent approaches and target di**erent goals. The4 all contri'"te to &ore e**icient net+or1ing sol"tions *or speci*ic +ireless en,iron&ent and adhoc co&&"nications. Hoint design +ith ph4sical la4er and lin1 la4er can contri'"te to higher e**icienc4 and relia'ilit4. The MAC la4er together +ith lin1 la4er can pla4 i&portant role in cross0la4er design.

[!6

RE=ERENCES
[! E (a,rilo,s1a and B . <rasad CAdhoc networ6in( towards sea1less co11unications > ? springer p"'ications. [% <rasant Mohapatra and Sri1anth Drisshna&"rth4 CAdhoc 1etwor6s technolo(ies and protocols > 6 springer p"'lications. [' C. D Toh CAdhoc 1o2ile wireless networ6s protocols and s+ste1s> ? pearson p"'lications. [: Sridhar !4er 6 !!T :o&'a4 > Mo2ile Adhoc Networ6> 6 http:$$+++.it.iit'.ernet.in.in$;sri.

[!&

You might also like