0% found this document useful (0 votes)
42 views

MAC Protocols: Lecturer: Dmitri A. Moltchanov E-Mail: Moltchan@cs - Tut.fi

The document discusses MAC protocols for ad hoc networks. It begins by outlining some of the key problems MAC protocols need to address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then describes the main design goals for MAC protocols. The document proceeds to classify MAC protocols into three categories: contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Specific protocols are then discussed in more detail, including how they address problems like collisions and bandwidth utilization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

MAC Protocols: Lecturer: Dmitri A. Moltchanov E-Mail: Moltchan@cs - Tut.fi

The document discusses MAC protocols for ad hoc networks. It begins by outlining some of the key problems MAC protocols need to address, such as bandwidth efficiency, hidden/exposed terminals, and mobility. It then describes the main design goals for MAC protocols. The document proceeds to classify MAC protocols into three categories: contention-based without reservation, contention-based with reservation, and contention-based with scheduling. Specific protocols are then discussed in more detail, including how they address problems like collisions and bandwidth utilization.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

MAC protocols

Lecturer: Dmitri A. Moltchanov


E-mail: [email protected]
http://www.cs.tut.fi/kurssit/TLT-2616/

Ad hoc networks

D.Moltchanov, TUT, 2011

OUTLINE:
Problems for MAC to deal with;
Design goals;
Classification of MAC protocols
Contention-based protocols
Contention-based with reservation mechanism
Contention-based with scheduling mechanism
MAC protocols for directional antennas
Power control MAC protocols

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

1. Problems for MAC to deal with


Aim of MAC: provide fair access to shared broadcast radio channel.

Issues to deal with:


Bandwidth efficiency:
must be maximized.
Real-time traffic support:
should be provided.
Synchronization:
sometimes needed, e.g. TDMA.
Shared broadcast medium:
collisions must be avoided/minimized.
Lack of central coordination:
fully distributed MAC design.

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

Hidden terminal problem:


collisions inefficient bandwidth utilization.

packets

hidden terminal

collision

receiver

packets

sender

Figure 1: Illustration of the hidden terminal problems.

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

Exposed terminal problem:


inability to transmit inefficient bandwidth utilization.

packets

receiver

packets

exposed terminal

sender

receiver

Figure 2: Illustration of the exposed terminal problem.

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

Mobility of nodes:
loss of connectivity;
network partitioning;
bit errors.

t
t+Delta(t)
Figure 3: Network partitioning is one of the biggest problem to deal with at MAC sublayer.

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

2. Design goals
What we want from MAC protocol:
operation of the protocol should be distributed;
should support real-time traffic;
the access delay must be minimized;
available bandwidth must be utilized efficiently;
fair bandwidth allocation to competing nodes;
control overhead must be minimized;
the effects of hidden/exposed terminals must be minimized;
must be scalable;
should minimize power consumption;
should provide synchronization between nodes.

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011

3. Classification of MAC protocols


MAC protocol for ad-hoc networks must be classified into:
Contention-based protocols without reservation/scheduling:
no reservation of the bandwidth is made;
guarantees are not possible.
Contention-based protocols with reservation mechanisms:
bandwidth for transmission is reserved in advance.
guarantees are possible.
Contention-based protocols with scheduling mechanisms:
distributed scheduling between nodes is used.
guarantees are possible.
Protocols that do not fall to any of these categories:
implement several features of different protocol groups or
use completely different approach

Lecture: MAC protocols

Ad hoc networks

D.Moltchanov, TUT, 2011


MAC protocols for ad-hoc networks

Contention-based

sender initiated

Reservation

Scheduling
- DPS;
- DWOP;
- DLPS.

receiver initiated

Other
- MMAC;
- MCSMA;
- PCM;
- RBAR.

- RI-BTMA;
- MACA-BI;
- MARCH.
synchronous
single channel
- MACAW;
- FAMA.

multiple channel
- BTMA;
- DBTMA;
- ICSMA.

Lecture: MAC protocols

- D-PRMA;
- CATA;
- HRMA;
- SRMA/PA;
- FPRP.

asynchronous
- MACA/PR;
- RTMAC.

Ad hoc networks

D.Moltchanov, TUT, 2011

4. Contention based protocols w/o reservation/scheduling


The basic idea: do your best to not cause a collision.

4.1. MACA protocol


MACA is based on CSMA/CA that operates as follows:
the sender sense the channel for the carrier signal;
if the carrier is present it retries to sense the channel after some time (exp. back-off);
if not, the sender transmits a packet.
The following shortcomings are inherent to CSMA/CA:
: hidden terminal problem leading to frequent collisions;
: exposed terminal problem leading to worse bandwidth utilization.
To avoid it:
virtual carrier sensing;
RTS-CTS handshake before transmission.

Lecture: MAC protocols

10

Ad hoc networks

D.Moltchanov, TUT, 2011

Neighbor

Sender

RTS

Receiver

Neighbor

RTS

CTS

Data

CTS

Data

ACK

ACK

Figure 4: Packet transmission in MACA.

Lecture: MAC protocols

11

Ad hoc networks

D.Moltchanov, TUT, 2011

NEIGHBOR
BACK-OFF RTS

DATA

SENDER
CTS

ACK

REVEIVER
BACK-OFF
NAV FROM RTS

NEIGHBOR

NAV FROM CTS


NAV FROM DATA

Figure 5: Usage of virtual carrier sensing.


NAV: network allocation vector implementation of virtual carrier sensing.

Lecture: MAC protocols

12

Ad hoc networks

D.Moltchanov, TUT, 2011

If the transmission fails:


contention window: CW2 (multiplicative increase, immediate decrease);
retransmission.

31

initial

63

1st

127

2nd

255

3rd

511
1023 slots

4th
5th

Figure 6: Evolution of the contention window with increasing of transmission attempts.

Lecture: MAC protocols

13

Ad hoc networks

D.Moltchanov, TUT, 2011

Problem 1 of MACA: starvation of flows:


both S1 and S2 have the high volume of traffic, S1 seizes the channel first;
packets transmitted by S2 get collided and it doubles CW (CW = 2CW );
the probability that the node S2 seizes the channel is decreasing.

S1

S2

Figure 7: Starvation of the flow from S2.


Solution:
the packet header contains the field set to the current back-off value of the transmitting node;
a node receiving this packet copies this value to its back-off counter (fairness);
CW = CWmin after every successful transmission.

Lecture: MAC protocols

14

Ad hoc networks

D.Moltchanov, TUT, 2011

Problem 2 of MACA: fast adjustment of CW:


when a node successfully transmits a packet;
when a collisions is detected by a node.
S1

S2

BACKOFF
CW=511
S1
RECEIVER
BACKOFF

RTS

CTS

DATA

ACK

CW=511

BACKOFF
CW=CW min

S2

Figure 8: Rapid adjustments of the CW.


Solution: multiplicative increase when collision, linear decrease when success.

Lecture: MAC protocols

15

Ad hoc networks

D.Moltchanov, TUT, 2011

Problem 3 of MACA: an exposed node is free to transmit.


ongoing transmission S1-R1;
node S2 hears RTS but not CTS (exposed node);
S2 initiates transfer to R2;
DATA from S1 and CTS from R2 may collide, CW unnecessary increases at S2.

RTS
R1

DATA

CTS

S1

DATA

CTS
R2

S2
RTS

RTS

Figure 9: Problems with exposed node.


Solution: use of small data sending packet (DS) to update information.

Lecture: MAC protocols

16

Ad hoc networks

D.Moltchanov, TUT, 2011

4.2. Busy tone multiple access protocol (BTMA)


Multichannel protocol where the channel is separated into:
control channel: used for data transmission;
data channel: used for busy tone transmission.
BTMA works as follows:
a node senses the control channel to check whether the busy tone is active;
if not, it turns on the busy tone signal and starts data transmission;
if yes, a node waits for a random period of time and repeats the procedure;
any node that senses the carrier on the incoming data channel also transmits a busy tone.
There are following advantages are shortcoming of the BTMA:
+: simple enough;
+: probability of collision is extremely low;
: bandwidth utilization is low (nodes are blocked in two-hop neighborhood).

Lecture: MAC protocols

17

Ad hoc networks

D.Moltchanov, TUT, 2011

4.3. MACA by invitation (MACA-BI)


Receiver-initiated MAC protocol providing the following extension to MACA:
MACA: RTS-CTS-DATA-ACK;
MACA-BI eliminates the need for CTS using the receivers ready-to-receive (RTR) packet.
Sender

Receiver
RTR

Neighbor
RTR

DATA

Figure 10: Transmission in MACA-BI.


needs information about the traffic at neighboring nodes;
this information is included into DATA packets.

Lecture: MAC protocols

18

Ad hoc networks

D.Moltchanov, TUT, 2011

4.4. Media access with reduced handshake (MARCH)


RTS packet is used only for the first DATA packet of the stream:
nodes know about packet arrival at neighboring node listening to CTS signals;
to relay packet, it sends a CTS packet to the concerned node.
node 1

node 2

node 3

node 4

RTS
CTS

CTS

DATA
CTS

CTS

DATA
CTS
Chain relaying

DATA

Figure 11: Relaying using the MARCH.

Lecture: MAC protocols

19

Ad hoc networks

D.Moltchanov, TUT, 2011

The CTS packet in MARCH carries the following information:


the MAC address of the sender and the receiver node;
route identification number Rid to distinguish between routes.
Route 1: A-B-C-D-E
Route 2: X-C-Y

MARCH is characterized by the following advantages and shortcomings:


+: very high throughput;
+: very low control overhead;
: access to routing information is required cross-layering!

Lecture: MAC protocols

20

Ad hoc networks

D.Moltchanov, TUT, 2011

5. Contention-based protocols with reservations


Use bandwidth reservation techniques:
contention occurs here only at resource reservation phase;
once bandwidth is reserved a node gets an exclusive access to the media.

5.1. Distributed packet reservation multiple access protocol (D-PRMA)


D-PRMA is a TDMA based scheme where the channel is divided into frames.
Frame length
Slot 1

Slot 2

Minislot 1

Minislot 2

RTS/BI

CTS/BI

...

Slot n

Minislot m

DATA

Figure 12: Frame structure in D-PRMA.

Lecture: MAC protocols

21

Ad hoc networks

D.Moltchanov, TUT, 2011

Slot reservation and overcoming the hidden terminal problem:


Request to send / busy indication (RTS/BI) and clear to send / busy indication (CTS/BI).
The protocol operates as follows:
nodes having a packet for transmission contend in the first minislot of each slot;
the remaining (m 1) minislots in the slot are granted to the node that wins the contention;
the same slot in subsequent frames is reserved for the this terminal, until it ends transmission;
if no node wins the first minislot, the remaining minislots subsequently used for contention;
within a reserved slot communication is performed using TDD or FDD.
Slot reservation mechanism performs as follows:
a certain period in the beginning of each minislot is reserved for carrier-sensing;
if a nodes detects a channel to be idle, it sends a RTS packet to destination using RTS/BI;
receiver answers with CTS packets in the CTS/BI field of the same minislot;
the sender upon receiving CTS, gets a reservation for current slot (all minislots).

Lecture: MAC protocols

22

Ad hoc networks

D.Moltchanov, TUT, 2011

To prioritize the voice traffic:


Rule 1:
voice nodes traffic are allowed to start contention from minislot 1 with probability 1.
data nodes start contention from minislot 1 with probability < 1;
for the remaining (m 1) minislots all nodes contend with probability 1.
Rule 2:
if the node winning the contention is the data node, only the current slot is reserved;
if the node winning the contention is the voice node, subsequent slots are also reserved.
To make it real the following requirements must be satisfied:
Requirements for nodes other than a winning one:
hidden and exposed terminals should be avoided;
no contention:
no contention in remaining minislots;
no contention in the subsequent slots.

Lecture: MAC protocols

23

Ad hoc networks

D.Moltchanov, TUT, 2011

Requirement 1: (no contention in other minislots)


Hidden terminal problem:
RTS packet do not suffer a collision due to carrier sensing (winning node transmits);
a node hearing the CTS is not allowed to transmit in the remaining period of the slot.
Exposed terminal problem:
A node hearing the RTS but not CTS is allowed to transmit.
Requirement 2: (no contention in other slots)
the receiver and sender transmit a BI signal in minislot 1 of the reserved slot;
when any node hears BI signal it does not contend in this slot;
when the transmission is completed both sides stops transmission of BI signal.
Advantages and shortcomings:
+: D-PRMA is best suited for voice applications;
: requires synchronization (TDMA).

Lecture: MAC protocols

24

Ad hoc networks

D.Moltchanov, TUT, 2011

6. Contention-based protocols with scheduling mechanisms


Aim is on transmission scheduling at nodes considering metrics:
delay targets of packets;
traffic load at nodes;
remaining battery power at nodes, etc.

6.1. Distributed priority scheduling (DPS)


This protocols is primarily based on IEEE 802.11 DCF using RTS-CTS-DATA-ACK mechanism.
The communication is as follows:
RTS packet transmitted by a node carries priority index of the packet (delay, etc.);
the receiver responds with CTS containing the priority tag and source ID copied from RTS;
neighbors retrieve this information from RTS and CTS and make entry in scheduling tables;
source sends DATA and receiver responds with ACK;
after DATA and ACK is transmitted neighbor updates their scheduling tables.

Lecture: MAC protocols

25

Ad hoc networks

D.Moltchanov, TUT, 2011

RTS

DATA

Node 3 (neighbor to node 1)

RTS

CTS

DATA

ACK

Node 1

RTS

CTS

DATA

ACK

Node 2
CTS

ACK

Node 4 (neighbor to node 2)


S

Figure 13: Packet exchange and scheduling tables update in DPS.

Lecture: MAC protocols

26

Ad hoc networks

D.Moltchanov, TUT, 2011

7. MAC protocols for directional antennas


The following advantages can be achieved using the directional antennas:
reduced signal interference;
increase in system throughput;
improved channel reuse.

7.1. MACA for directional antennas


For this protocol the following assumptions are used:
each node has only one radio transceiver;
transceiver is equipped with M directional antennas;
each antenna covers angle 2/M ;
transmissions by adjacent antennas never overlap;
MAC layer is able to switch antennas individually or all antennas together.
Packet transmission is made using RTS-CTS-DATA-ACK.

Lecture: MAC protocols

27

Ad hoc networks

D.Moltchanov, TUT, 2011

S
RT S
CT ATA
D

Figure 14: Packet transmission using directional antennas.


The main problem is to determine the direction of each other:
idle node listens on all antennas;
the sender transmits RTS using omnidirectional transmission;
the receiver responses with CTS using omnidirectional transmission;
both determines the antennas with the highest quality of the signal and switch them up.

Lecture: MAC protocols

28

Ad hoc networks

D.Moltchanov, TUT, 2011

7.2. Directional busy tone based MAC protocol


The major features of this protocol are as follows:
it uses directional antenna consisting of N elements;
for broadcast all elements are used;
for unicast only one element is used;
when a node is idle all elements sensing the channel;
while receiving only one element receives the signal.
It operates as follows:
a node senses the channel for presence of receiver busy tone (BTr );
if BTt is not active, it sends RTS on all antennas elements;
the receiver receives RTS and makes sure that BTt is not present;
then, the receiver transmits CTS directionally to the sender and turn on the BTr ;
the sender turns on the BTt and sends the DATA packet.

Lecture: MAC protocols

29

Ad hoc networks

D.Moltchanov, TUT, 2011

8. Power control MAC protocol


This protocol allows to vary a transmission range of nodes on a per-packet basis.
There are two modes of operation:
BASIC protocol;
PCM protocol.
The BASIC protocol operates as follows:
RTS and CTS packets are transmitted using the maximum power pmax ;
RTS-CTS packets are used to decide necessary transmission power for DATA and ACK packets:
Method 1: The receiver send CTS with estimated transmitted level pd < pmax ;
Method 2: CTS is sent back using pmax and the source calculates pd based on pmax :
pmax
pd =
Rxth c,
pr

(1)

where
Rxth is the minimum required power and c is a constant
pr is the received signal strength.

Lecture: MAC protocols

30

Ad hoc networks

D.Moltchanov, TUT, 2011


Node C sense carrier of RTS but not CTS;
Node D sense carrier of CTS but not RTS;
D

se
ns
ing

ACK

RT
S

DATA

RTS

S
CT

Both waits for extended IFS:


- C packet may collide with ACK;
- D packet may collide with DATA.

ing
s
n
se

Solution: increase power to pmax during


DATA packet transmission:

CTS

pmax
pd

DATA packet

Figure 15: The major problem associated with BASIC protocol.

Lecture: MAC protocols

31

You might also like