Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Wireless & Mobile Networking: Multiple Radio Access Azizol Bin Abdullah (A2.04) Rujukan: Text Book Chapter 6.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Prof.R.K.NADESH;SITE;VIT MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals:
CS352- Link Layer Dept. of Computer Science Rutgers University.
Medium Access Control Sublayer
1 Wireless Medium Access Control Protocols CS 851 Seminar University of Virginia
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
Wireless Communications
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
: Data Communication and Computer Networks
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
MEDIUM ACCESS CONTROL Wireless channel is a shared medium MAC coordinates transmission between users sharing the spectrum Goals: prevent collisions while.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Chapter 6 Multiple Radio Access
A Medium Access Protocol for Interconnecting ATM and Wireless Networks Time division multiple access/frequency division duplex. Voice mobiles require real-time.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
2. Data Link Layer: Medium Access Control. Scheduling.
Multiple Access Methods
Wireless Sensor Networks 4. Medium Access
CT301 LECTURE 8.
Wireless LANs Wireless proliferating rapidly.
Net301 lecture9 11/5/2015 Lect 9 NET301.
THE IEEE MAC SUB-LAYER – chapter 14
Mobile Communications Chapter 3 : Media Access
Mobile Communications Media Access Chapter 3
Communication Networks NETW 501
Multiple Access Methods
Unit 2 Medium Access control
Mobile Communications Chapter 3 : Media Access
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
Lecture 5- Data Link Layer
Subject Name: Adhoc Networks Subject Code: 10CS841
Multiple Access Methods
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb

Introduction Survey Distributed vs. Centralized Networks Wireless MAC Issues Low Power Sensor Nodes Random Access Guaranteed Access Hybrid Access

Introduction Cont’d. Distributed MAC Protocols Distributed Foundation Wirelesss MAC (DFWMAC) Eliminate Yield – Non-Preemptive Priority Multiple Access (EY-NPMA)

Introduction Cont’d. Centralized MAC Protocols Random Access Idle Sense Multiple Acces (ISMA) Randomly Addressed Polling (RAP) Resource Auction Multiple Access (RAMA) Guaranteed Access Zhang’s and Acampora’s Proposals Disposable Token MAC Protocol (DTMP)

Introduction Cont’d. Hybrid Access Random Reservation Protocols (RRA) Packet Reservation Multiple Access (PRMA) Random Reservation Access – Independent Stations Algorithm (RRA-ISA) Distributed Queuing Request Updated Multiple Access (DQRUMA) Moble Access Scheme based on Contention and Reservation for ATM (MASCARA)

Introduction Cont’d. Dynamic Slot Assignment ++ (DSA++)

Distributed Wireless Network ad hoc network No central administration Multi-hop wireless networks Wireless Sensor Nets

Centralized Wireless Network Last Hop Network Very common Corporate, Academic, and Cellular uses. Has a controlling Base Station, with variable intelligence Wireless Access Point Cellular Tower

Wireless MAC Issues Half-Duplex No Collision Detection Uplink and Downlink must be multiplexed Time Varying Channel Reflection, Diffraction, and Scattering Different version of signal are superimposed on each other Multipath Propagation Coherence Time = time signal strength changes by 3dB

Wireless MAC Issues Cont’d. Burst Channel Errors Higher BER Errors occur in long bursts Link Layer retransmission based on immediate ACKs

Wireless MAC Issues Cont’d. Location Dependent Carrier Sensing Hidden Nodes: Node A doesn’t know Node B is also talking to BS Exposed Nodes: Node A knows node B is talking, but doesn’t know that it will not affect Node A’s conversation with BS Capture: Node A and B are both transmitting to BS, but since Node A’s signal strength is stronger Node A’s transmission is used no collision is detected.

Random Access Random Access is based on a “Talk whenever you want” way of thinking Collisions are resolved by a contention resolution algorithm Distributed Networks

Guaranteed Access Access to medium is scheduled Round Robin Master/Slave (Polling) Tokens TDMA, FDMA

Hybrid Access Melds best qualities of Random and Guaranteed Access Request-Grant mechanisms Requests are Random Access, and once reserved transmission is guaranteed Random Reservation Access Demand Assignment

Distributed Foundation Wireless MAC (DFWMAC) Standard 4-way exchange: RTS- CTS-DATA-ACK No ACK causes sender to retransmit No CTS causes exponential backoff RTS and CTS contain a NAV which details how much data is to be sent

Elimination Yield – Non-Preemptive Priority Multiple Access (EY-NPMA) HIPERLAN Sense channel for time to send (TTS) 1700 bits, if clear, then send If busy, N slots; When done listen again If still busy, abort; Else listen again, and if not busy then transmit until finished

Idle Sense Multiple Access (ISMA) Carrier Sensing and Collision detection are performed by the BS When medium is idle BS broadcasts idle signal (IS) Nodes with data send If collision BS cannot decode signal, does not send ACK and broadcasts IS again Otherwise BS sends ACK/ISA (ISA) Efficiency is improved by using small Reservation packets

Randomly Address Polling (RAP) Nodes with data broadcast orthogonal “codes” simultaneously BS receives all codes, using a CDMA receiver BS then polls each code All nodes with that code transmit If only one node the BS sends ACK More than one node with code causes BS to send NACK Reservation RAP supports nodes with streaming traffic

RAP

Resource Auction Multiple Access (RAMA) Each node has and N-bit ID and transmits it, in contention phase BS then echos back ID it heard bit-by-bit Once a node receives a bit it did not transmit, it drops out Since BS does an OR operation on received IDs then node with highest ID always wins

Zhang’s Proposal BS polls each node for data, round robin Node responds with data request, or a keep alive if queue is empty BS then polls each node that responded with a data request

Disposable Token MAC Protocol (DTMP) Improves on Zhang’s proposal When polling nodes BS indicates if it has data to send to nodes If no data, then remain silent Otherwise send short message Transmit any data to send Channel is assumed to be reciprocal

Acampora’s Proposal Poll, request, data phases BS polls each node, if the node has data to sends it responds The BS the broadcasts this nodes ID so that all nodes know the order in which to send BS then polls nodes each node in turn for its data

Various Proposals

Random Reservation Protocols (RRA) Uplink is time slotted Each slot large enough to carry one voice packet Downlink is broadcast channel Nodes use random access to request reservations for data to send BS enforces a policy of reservations Stream Reservation Complete BS scheduling

Packet Reservation Multiple Access (PRMA) A node with a back-logged voice packet transmits with probability p If successful, reserves that slot for following packets Data is similar, though no reservations are made Different access probabilities are used for voice and data Introduction of data packets into voice only network decreases efficiency Improvements include limited data reservations, separating voice and data channels (FRMA), separating request and data channels (PRMA++) Centralized PRMA uses scheduling to achieve QOS

Random Reservation Access – Independent Stations Algorithm (RRA-ISA) BS polls a subset of all nodes Subset is defined by the probability of a single transmission in a slot is maximized BS uses channel history to compute subsets

Distributed-Queuing Request Update Multiple Access (DQRUMA) Uplink and Downlink are duplexed Uplink has request channel and packet channel Request channel is for contention requests Packet channel is for data (and piggyback new contention requests) Downlink has 3 messages: ACK for current slot, transmission permission for node to use next uplink slot, and data to the nodes Better than RAMA and PRMA

Mobile Access Scheme based on Contention and Reservation for ATM (MASCARA) Frame consists of three periods: broadcast, reserved, and contention Broadcast informs nodes of structure of current frame and scheduled uplink transmissions Reserved period consists of downlink data, and uplink data as defined in broadcast period Contention is random access and used to send new requests to BS

Dynamic Slot Assignment++ (DSA++) MAC on uplink is TDMA Both uplink and downlink are slotted Each downlink slot contains some data and a MAC message MAC message contains ACK for transmission on previous uplink slot and a reservation for next uplink slot BS collects all requests and schedules uplink transmissions

Hybrids

Comparison Summary

Comparisons QoS guarantees are not suited to Random Access protocols because delay cannot be bounded Demand Assignment protocols are best suited to multimedia applications Random Access lends itself to large networks Polling protocols are efficient only for smaller networks TDD protocols perform poorly at high data rates due to increase in switching