SlideShare une entreprise Scribd logo
1  sur  18
Wireless and Mobile Computing
Delivered
By
Khadija Manzoor
Department of CS& IT
University of Gujrat
Lecture Agenda
 The aim of this lecture is to provide the reader
with a comprehensive view of the role and details
of the protocols that define and control access to
the wireless channel, i.e., wireless media access
protocols (MAC) protocols.
 Mac layer for Wireless and its issues
 MAC Classifications
 Design Goals
Introduction
 In the broadest terms, a wireless network consists of nodes
that communicate by exchanging “packets” via radio
waves.
 These packets can take two forms. A unicast packet
contains information that is addressed to a specific node,
whereas a multicast packet distributes the information to a
group of nodes.
 The MAC protocol simply determines when a node is
allowed to transmit its packets, and typically controls all
access to the physical layer.
Introduction
 The specific functions associated with a MAC protocol vary
according to the system requirements and application.
 For example, wireless broadband networks carry data
streams with strict quality of service (QoS) requirements.
This requires a complex MAC protocol that can
adaptively manage the bandwidth resources in order to
meet these demands.
 Design and complexity are also affected by the network
architecture, communication model, and duplexing
mechanism employed.
Issues
 The main issues need to be addressed while designing a
MAC protocol for ad hoc wireless networks:
• Bandwidth efficiency is defined at the ratio of the bandwidth
used for actual data transmission to the total available
bandwidth. The MAC protocol for ad-hoc networks should
maximize it.
• Quality of service support is essential for time-critical
applications. The MAC protocol for ad-hoc networks should
consider the constraint of ad-hoc networks.
• Synchronization can be achieved by exchange of control
packets.
Issues
 The main issues need to be addressed while designing a MAC
protocol for ad hoc wireless networks:
 Hidden and exposed terminal problems:
 Hidden nodes:
 Hidden stations: Carrier sensing may fail to detect
another station.
 Fading: The strength of radio signals diminished rapidly
with the distance from the transmitter.
 Exposed nodes:
 Exposed stations: B is sending to A. C can detect it. C
might want to send to E but conclude it cannot transmit
because C hears B.
 Collision masking: The local signal might drown out
the remote transmission.
 Error-Prone Shared Broadcast Channel
 Distributed Nature/Lack of Central Coordination
 Mobility of Nodes: Nodes are mobile most of the time.
Near and far terminals
 Consider the situation A and B are both sending with the same
transmission power. As the signal strength decreases
proportionally to the square of the distance, B’s signal drowns out
A’s signal.
 As a result, C cannot receive A’s transmission.
 Now think of C as being an intermediary for sending rights (e.g.,
C acts as a base station coordinating media access). In this case,
terminal B would already drown out terminal A on the physical
layer. C in return would have no chance of applying a fair scheme
as it would only hear B.
Near and far terminals
 The near/far effect is a severe problem of wireless networks. All
signals should arrive at the receiver with more or less the same
strength.
 Otherwise a person standing closer to somebody could always
speak louder than a person further away. Even if the senders were
separated by code, the closest one would simply drown out the
others.
 Precise power control is needed to receive all senders with the
same strength at a receiver.
issues
 The combination of network architecture, communication
model, and duplexing mechanism define the general
framework within which a MAC protocol is realized.
 Decisions made here will define how the entire system
operates and the level of interaction between individual
nodes. They will also limit what services can be offered and
define MAC protocol design.
 However, the unique characteristics of wireless
communication must also be taken into consideration.
issues
 Here, we explore these physical constraints and discuss
their impact on protocol design and performance.
 Radio waves propagate through an unguided medium
that has no absolute or observable boundaries and is
vulnerable to external interference. Thus, wireless links
typically experience high bit error rates and exhibit
asymmetric channel qualities.
 Techniques such as channel coding, bit interleaving,
frequency/space diversity, and equalization increase the
survivability of information transmitted across a
wireless link.
 However, the presence of asymmetry means that
The 802.11 MAC Sublayer
Protocol
Design goals of a MAC Protocol
 Design goals of a MAC protocol for ad hoc wireless networks
• The operation of the protocol should be distributed.
• The protocol should provide QoS support for real-time traffic.
• The access delay, which refers to the average delay experienced by
any packet to get transmitted, must be kept low.
• The available bandwidth must be utilized efficiently.
• The protocol should ensure fair allocation of bandwidth to nodes.
Design goals of a MAC Protocol
• Control overhead must be kept as low as possible.
• The protocol should minimize the effects of hidden and exposed
terminal problems.
• The protocol must be scalable to large networks.
• It should have power control mechanisms.
• The protocol should have mechanisms for adaptive data rate control.
• It should try to use directional antennas.
• The protocol should provide synchronization among nodes.
Classifications of MAC protocols
 Ad hoc network MAC protocols can be classified into
four types:
• Contention-based protocols
• Contention-based protocols with reservation mechanisms
• Contention-based protocols with scheduling mechanisms
• Other MAC protocols
15
MAC Protocols for Ad Hoc
Wireless Networks
Contention-Based
Protocols
Contention-based
protocols with
reservation mechanisms
Other MAC
Protocols
Contention-based
protocols with
scheduling mechanisms
Sender-Initiated
Protocols
Receiver-Initiated
Protocols
Synchronous
Protocols
Asynchronous
Protocols
Single-Channel
Protocols
Multichannel
Protocols
MACAW
FAMA
BTMA
DBTMA
ICSMA
RI-BTMA
MACA-BI
MARCH
D-PRMA
CATA
HRMA
RI-BTMA
MACA-BI
MARCH
SRMA/PA
FPRP
MACA/PR
RTMAC
Directional
Antennas
MMAC
MCSMA
PCM
RBAR
Classifications of MAC Protocols
 Contention-based protocols
• Sender-initiated protocols: Packet transmissions are initiated by
the sender node.
• Single-channel sender-initiated protocols: A node that wins
the contention to the channel can make use of the entire
bandwidth.
• Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
• Receiver-initiated protocols: The receiver node initiates the
contention resolution protocol.
Classifications of MAC Protocols
 Contention-based protocols with reservation
mechanisms
• Synchronous protocols: All nodes need to be synchronized. Global
time synchronization is difficult to achieve.
• Asynchronous protocols: These protocols use relative time information
for effecting reservations.
Classifications of MAC Protocols
 Contention-based protocols with scheduling
mechanisms
• Node scheduling is done in a manner so that all nodes are
treated fairly and no node is starved of bandwidth.
• Scheduling-based schemes are also used for enforcing priorities
among flows whose packets are queued at nodes.
• Some scheduling schemes also consider battery characteristics.
 Other protocols are those MAC protocols that do not
strictly fall under the above categories.

Contenu connexe

Similaire à W13-L1&2.pptx

Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
ABYTHOMAS46
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
ambitlick
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
chempa
 

Similaire à W13-L1&2.pptx (20)

1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
mn paper
mn papermn paper
mn paper
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Tmac
TmacTmac
Tmac
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Issues In Adhoc Wireless Network
Issues In Adhoc Wireless NetworkIssues In Adhoc Wireless Network
Issues In Adhoc Wireless Network
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia NetworksA Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 

Plus de HirazNor (14)

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Folk Media Lec 14.pptx
Folk Media Lec 14.pptxFolk Media Lec 14.pptx
Folk Media Lec 14.pptx
 
AI-Lec2-Agents.pptx
AI-Lec2-Agents.pptxAI-Lec2-Agents.pptx
AI-Lec2-Agents.pptx
 
AI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptxAI-Lec5-Searches in AI.pptx
AI-Lec5-Searches in AI.pptx
 
C3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptxC3_Gossip_B_CSRAfinal-.pptx
C3_Gossip_B_CSRAfinal-.pptx
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
IAP PPT-2.pptx
IAP PPT-2.pptxIAP PPT-2.pptx
IAP PPT-2.pptx
 
Lecture 15.ppt
Lecture 15.pptLecture 15.ppt
Lecture 15.ppt
 
Routing Protocols.pptx
Routing Protocols.pptxRouting Protocols.pptx
Routing Protocols.pptx
 
W09-L01.pptx
W09-L01.pptxW09-L01.pptx
W09-L01.pptx
 
hafsa 24.pptx
hafsa 24.pptxhafsa 24.pptx
hafsa 24.pptx
 
IAP PPT-1.pptx
IAP PPT-1.pptxIAP PPT-1.pptx
IAP PPT-1.pptx
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 

Dernier

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

W13-L1&2.pptx

  • 1. Wireless and Mobile Computing Delivered By Khadija Manzoor Department of CS& IT University of Gujrat
  • 2. Lecture Agenda  The aim of this lecture is to provide the reader with a comprehensive view of the role and details of the protocols that define and control access to the wireless channel, i.e., wireless media access protocols (MAC) protocols.  Mac layer for Wireless and its issues  MAC Classifications  Design Goals
  • 3. Introduction  In the broadest terms, a wireless network consists of nodes that communicate by exchanging “packets” via radio waves.  These packets can take two forms. A unicast packet contains information that is addressed to a specific node, whereas a multicast packet distributes the information to a group of nodes.  The MAC protocol simply determines when a node is allowed to transmit its packets, and typically controls all access to the physical layer.
  • 4. Introduction  The specific functions associated with a MAC protocol vary according to the system requirements and application.  For example, wireless broadband networks carry data streams with strict quality of service (QoS) requirements. This requires a complex MAC protocol that can adaptively manage the bandwidth resources in order to meet these demands.  Design and complexity are also affected by the network architecture, communication model, and duplexing mechanism employed.
  • 5.
  • 6. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks: • Bandwidth efficiency is defined at the ratio of the bandwidth used for actual data transmission to the total available bandwidth. The MAC protocol for ad-hoc networks should maximize it. • Quality of service support is essential for time-critical applications. The MAC protocol for ad-hoc networks should consider the constraint of ad-hoc networks. • Synchronization can be achieved by exchange of control packets.
  • 7. Issues  The main issues need to be addressed while designing a MAC protocol for ad hoc wireless networks:  Hidden and exposed terminal problems:  Hidden nodes:  Hidden stations: Carrier sensing may fail to detect another station.  Fading: The strength of radio signals diminished rapidly with the distance from the transmitter.  Exposed nodes:  Exposed stations: B is sending to A. C can detect it. C might want to send to E but conclude it cannot transmit because C hears B.  Collision masking: The local signal might drown out the remote transmission.  Error-Prone Shared Broadcast Channel  Distributed Nature/Lack of Central Coordination  Mobility of Nodes: Nodes are mobile most of the time.
  • 8. Near and far terminals  Consider the situation A and B are both sending with the same transmission power. As the signal strength decreases proportionally to the square of the distance, B’s signal drowns out A’s signal.  As a result, C cannot receive A’s transmission.  Now think of C as being an intermediary for sending rights (e.g., C acts as a base station coordinating media access). In this case, terminal B would already drown out terminal A on the physical layer. C in return would have no chance of applying a fair scheme as it would only hear B.
  • 9. Near and far terminals  The near/far effect is a severe problem of wireless networks. All signals should arrive at the receiver with more or less the same strength.  Otherwise a person standing closer to somebody could always speak louder than a person further away. Even if the senders were separated by code, the closest one would simply drown out the others.  Precise power control is needed to receive all senders with the same strength at a receiver.
  • 10. issues  The combination of network architecture, communication model, and duplexing mechanism define the general framework within which a MAC protocol is realized.  Decisions made here will define how the entire system operates and the level of interaction between individual nodes. They will also limit what services can be offered and define MAC protocol design.  However, the unique characteristics of wireless communication must also be taken into consideration.
  • 11. issues  Here, we explore these physical constraints and discuss their impact on protocol design and performance.  Radio waves propagate through an unguided medium that has no absolute or observable boundaries and is vulnerable to external interference. Thus, wireless links typically experience high bit error rates and exhibit asymmetric channel qualities.  Techniques such as channel coding, bit interleaving, frequency/space diversity, and equalization increase the survivability of information transmitted across a wireless link.  However, the presence of asymmetry means that
  • 12. The 802.11 MAC Sublayer Protocol
  • 13. Design goals of a MAC Protocol  Design goals of a MAC protocol for ad hoc wireless networks • The operation of the protocol should be distributed. • The protocol should provide QoS support for real-time traffic. • The access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low. • The available bandwidth must be utilized efficiently. • The protocol should ensure fair allocation of bandwidth to nodes.
  • 14. Design goals of a MAC Protocol • Control overhead must be kept as low as possible. • The protocol should minimize the effects of hidden and exposed terminal problems. • The protocol must be scalable to large networks. • It should have power control mechanisms. • The protocol should have mechanisms for adaptive data rate control. • It should try to use directional antennas. • The protocol should provide synchronization among nodes.
  • 15. Classifications of MAC protocols  Ad hoc network MAC protocols can be classified into four types: • Contention-based protocols • Contention-based protocols with reservation mechanisms • Contention-based protocols with scheduling mechanisms • Other MAC protocols 15 MAC Protocols for Ad Hoc Wireless Networks Contention-Based Protocols Contention-based protocols with reservation mechanisms Other MAC Protocols Contention-based protocols with scheduling mechanisms Sender-Initiated Protocols Receiver-Initiated Protocols Synchronous Protocols Asynchronous Protocols Single-Channel Protocols Multichannel Protocols MACAW FAMA BTMA DBTMA ICSMA RI-BTMA MACA-BI MARCH D-PRMA CATA HRMA RI-BTMA MACA-BI MARCH SRMA/PA FPRP MACA/PR RTMAC Directional Antennas MMAC MCSMA PCM RBAR
  • 16. Classifications of MAC Protocols  Contention-based protocols • Sender-initiated protocols: Packet transmissions are initiated by the sender node. • Single-channel sender-initiated protocols: A node that wins the contention to the channel can make use of the entire bandwidth. • Multichannel sender-initiated protocols: The available bandwidth is divided into multiple channels. • Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.
  • 17. Classifications of MAC Protocols  Contention-based protocols with reservation mechanisms • Synchronous protocols: All nodes need to be synchronized. Global time synchronization is difficult to achieve. • Asynchronous protocols: These protocols use relative time information for effecting reservations.
  • 18. Classifications of MAC Protocols  Contention-based protocols with scheduling mechanisms • Node scheduling is done in a manner so that all nodes are treated fairly and no node is starved of bandwidth. • Scheduling-based schemes are also used for enforcing priorities among flows whose packets are queued at nodes. • Some scheduling schemes also consider battery characteristics.  Other protocols are those MAC protocols that do not strictly fall under the above categories.