0% found this document useful (0 votes)
127 views12 pages

MAC Compatibility Mode

This document discusses media access control (MAC) protocols for mobile computing. It begins by explaining that MAC addresses medium access and is implemented in hardware. The main issues for wireless MAC are bandwidth efficiency, hidden/exposed node problems, and mobility. It then covers contention-based MAC protocols like MACA, which uses RTS/CTS handshaking to address hidden/exposed node issues. Classification of MAC protocols includes contention-free (TDMA, FDMA) and contention-based styles.

Uploaded by

adane21
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views12 pages

MAC Compatibility Mode

This document discusses media access control (MAC) protocols for mobile computing. It begins by explaining that MAC addresses medium access and is implemented in hardware. The main issues for wireless MAC are bandwidth efficiency, hidden/exposed node problems, and mobility. It then covers contention-based MAC protocols like MACA, which uses RTS/CTS handshaking to address hidden/exposed node issues. Classification of MAC protocols includes contention-free (TDMA, FDMA) and contention-based styles.

Uploaded by

adane21
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

IT408 Mobile Computing

Media Access Control Protocols

0.1

Application

Transport

Network

Data Link Media Access Control Physical

0.2

Purpose
Addressing and medium access control mechanisms Implemented in hardware: medium access controller Medium access control comprises all mechanisms that regulate user access to a medium using SDM, FDM, TDM or CDM
0.3

MAC schemes from wired networks


CSMA/CD used with Ethernet Token Bus Token Ring Token Passing

-> Fail to work in wireless networks


0.4

ISSUES in Wireless MAC


Bandwidth Efficiency
BW available is very limited MAC should be designed such that the scarce bandwidth is utilized in an efficient manner

Hidden and Exposed Node Problem Collision-prone shared channel


Multiple nodes may contend for the medium leading to collision MAC should make sure that collision is minimized
0.5

ISSUES in Wireless MAC


Mobility of Nodes
Control information exchanged may become useless due to mobility MAC performance should be satisfactory when nodes are mobile

Power consumption

0.6

Hidden Terminal Problem


B C

A and C cannot hear each other. A sends to B, C cannot receive A. C wants to send to B, C senses a free medium (CS fails) Collision occurs at B. A cannot receive the collision (CD fails). A is hidden for C.
0.7

Exposed Terminal Problem

B B->A, C->D

B starts sending to A. C wants to send to D, C senses carrier, finds medium in use and has to wait for B->A to end. D is outside the range of A and B, therefore waiting is not necessary. C is exposed to B and causes unnecessary delay 0.8

Design Goals
Available bandwidth should be utilized efficiently Fair allocation of bandwidth Control overhead should be kept low Should minimize the effect of hidden and exposed node Should be scalable to large network Should have power control mechanisms to manage energy consumption of the nodes
0.9

Classification of MAC protocols wireless


Contention-free
SDMA - Space Division Multiple Access TDMA - Time Division Multiple Access FDMA - Frequency Division Multiple Access CDMA Code Division Multiple Access Polling - centralized with master/slave schemes

Contention-based
MACA (Multiple Access with Collision Avoidance) MACAW
0.10

MACA
Proposed as an alternative to the traditional CSMA/CD CSMA senses the state of the channel only at the transmitter
Leads to hidden node problem

MACA uses Request To Send (RTS) and Clear To Send (CTS) to overcome hidden node problem and exposed node problem
Node which only hears CTS (but no RTS), stops from transmitting (hidden node) Node which only hears RTS (but no CTS), is free to transmit (exposed node) RTS and CTS carry the expected duration of data transmission

When there is a collision, it uses binary exponential backoff (BEB) before retrying

0.11

Packet Transmission in MACA


A Bsender Creceiver D

RTS

RTS

CTS

CTS

DATA

DATA

0.12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy