Lecture 05-MAC Protocols for Wireless Networks
Lecture 05-MAC Protocols for Wireless Networks
(CS-6311)
Lecture# 05
• Data link layer ensures that raw data from the physical layer is organized
into frames and reliably transmitted to the next node.
• The Logical Link Control layer ensures smooth communication between
network devices
• The Media/ Multiple Access Control regulates access to the shared
communication medium
Medium Access Control (MAC) Protocols for
Wireless Networks
• MAC protocol manages how devices share bandwidth and access the
communication medium
• It minimize collisions, ensure fair access, optimize energy consumption,
and maximize network performance
• The 48 bit MAC address is a unique identifier assigned to every network
interface controller (NIC) in a device.
• It is used to identify devices on a network and ensure that data packets
are sent to the correct device.
Medium Access Control (MAC) Protocols for
Wireless Networks
• All nodes share same link to send and receive the data
• When multiple nodes share data at same time there is great chance of data collision
and consequently data would be lost.
• In order to avoid this data collision on shared path, MAC plays its crucial role
through three difference protocols such as Random Access protocol, Control
Access protocol, and Channelization Protocol
Medium Access Control (MAC) Protocols for
Wireless Networks
ALOHA operation
o Transmission occurs when a node transmits data whenever it has something to
send, without checking if the channel is free.
o If two or more nodes transmit at overlapping times, a collision occurs, and both
packets are lost.
o If no ACK is received (due to collision or error), the sender assumes failure.
o ALOHA has a maximum throughput efficiency of 18.4%, as collisions are
common.
Medium Access Control (MAC) Protocols for
Wireless Networks
Contention-Based Protocol
ALOHA operation
• Each station sends a frame
whenever it has a frame to
send.
Efficiency
ALOHA has an efficiency of 18.4%, meaning that 18.4% of frames reach their
destination successfully.
Vulnerable period
It is the time during which a frame is vulnerable to collision, and it lasts for two frame
times.
Example: An aloha network transmits 200 bit frames on a shared channel of 200 kbps.
What is the requirement to make this frame collision free?
Medium Access Control (MAC) Protocols for
Wireless Networks
Contention-Based Protocol
ALOHA operation
Medium Access Control (MAC) Protocols for
Wireless Networks
Contention-Based Protocol
Synchronization
--SYNC packets are exchanged periodically to maintain schedule
synchronization
--Receivers will adjust their timer counters immediately after they receive
the SYNC packet
Medium Access Control (MAC) Protocols for
Wireless Networks
Contention-Based Protocol
Example:
--Two-hop network with two sources and two sinks
--Sources periodically generate a sensing message which is divided into fragments
--Traffic load is changed by varying the inter-arrival period of the messages
--For inter-arrival period of 5s, message is generated
every 5s by each source
--Here inter-arrival period varies between 1-10s
--a source node generates 10 messages
--Each message has 10 fragments where 200 data packets
to be passed from source to sink nodes
--Each fragment has 40 bytes, total l8000 bytes at all
Medium Access Control (MAC) Protocols for
Wireless Networks
Contention-Based Protocol
• Dead node
The End