Professional Documents
Culture Documents
Receiver Sender
Sender
❑ Exposed node problem
When a node overhears another transmission and hence refrains to
transmit any data of its own, even though such a transmission would not
cause a collision due to the limited radio range of the nodes.
Data
Y X S D
Design Issues
❑ Mobility of nodes
❑ Very important factor affecting the performance (throughput) of the
protocol
❑ Bandwidth reservations or control information exchanged may end up
being of no use if the node mobility is very high
❑ Protocol design must take this mobility factor into consideration
→ system performance should not significantly affected due to node
mobility
Design goals of a MAC Protocol
A B C
Contention-based protocols
21
Fundamental Assumptions
❑ Symmetry
22
Three-Way Handshake
❑ A sends Ready-to-Send (RTS)
❑ B responds with Clear-to-Send (CTS)
❑ A sends DATA PACKET
❑ RTS and CTS announce the duration of the data transfer
❑ Nodes overhearing RTS keep quiet for some time to allow A to receive CTS
❑ Nodes overhearing CTS keep quiet for some time to allow B to receive data
packet
CTS (10)
CTS: Request
RTS: Clear ToTo
Send
Send DATA
RTS (10)
A
C
E
23
More Details for MACA
❑ A sends out RTS and set a timer and waits for CTS
❑ If A receives CTS before timer go to zero, OK! sends data packet
❑ Otherwise, A assumes there is a collision at B
Double the backoff counter interval
» Randomly pick up a timer from [1,backoff counter]
Send next RTS after timer go to zero
❑ B sends out CTS, then set a timer and waits for data packet
❑ If data packet arrives before timer go to zero, OK!
❑ Otherwise, B can do other things
❑ C overhears A’s RTS, set a timer which is long enough to allow A to receive
CTS. After the timer goes to zero, C can do other things
❑ D overhears B’s CTS, set a timer which is long enough to allow B to receive
data packet.
❑ E overhears A’s RTS and B’s CTS, set a timer which is long enough to allow
B to receive data packet.
❑ RTS and CTS can also contain info to allow sender A to adjust power to
reduce interference
Note: no carrier sense
24
Hidden Terminal Problem Still Exists (1)
CTS
DATA
RTS
B
C
25
Hidden Terminal Problem Still Exists (2)
CTS
RTS
DATA
RTS
B
C
E
A
26
Exposed Terminal Problem Still Exists
RTS
DATA
CTS
A
D C
27
Summary
❑ MACA did not solve hidden & exposed terminal problems
❑ MACA did not provide specifications about parameters
A B
Two flows
C D
Fairness Issues in MAC
A B
Two flows
C D
Fairness Issues in MAC
A B
Two flows
C D
MACAW: A Media Access
Protocol for Wireless LAN’s
38
Revisit Hidden Terminal Problem
39
Four-Way Handshake
❑ Sender sends Ready-to-Send (RTS)
❑ Receiver responds with Clear-to-Send (CTS)
❑ Sender sends DATA PACKET
❑ Receiver acknowledge with ACK
❑ RTS and CTS announce the duration of the transfer
❑ Nodes overhearing RTS/CTS keep quiet for that duration
❑ Sender will retransmit RTS if no ACK is received
If ACK is sent out, but not received by sender, after receiving new RTS, receiver returns ACK instead
of CTS for new RTS
ACK
CTS(T)
CTS:Request
RTS: Clear ToTo
Send
Send DATA
RTS(T)
destination
source
40
Revisit Exposed Terminal Problem
❑ RTS/CTS/DATA/ACK can not solve exposed terminal problem
❑ When overhearing RTS, the node needs to wait longer enough to allow the
data packet being completely transmitted even it does not overhear CTS
❑ To relieve exposed terminal problem,
➢ Let exposed terminal know the DATA packet does
be transmitted
➢ Extra message DS (data send)
❑ Five Handshaking to let exposed terminal know how long it should wait
41
Five-Way Handshake
❑ Sender sends Ready-to-Send (RTS)
❑ Receiver responds with Clear-to-Send (CTS)
❑ Sender sends DATA SENDING (DS)
❑ Sender sends DATA PACKET
❑ Receiver acknowledge with ACK
❑ RTS and CTS announce the duration of the transfer
❑ Nodes overhearing RTS/CTS keep quiet for that
duration
CTS
ACK
CTS:
RTS: Clear
DS:RequestToToSend
Data Sending
Send RTS
DS
DATA
C A
Comparison with DS and without DS
CTS
ACK
DATA
RTS
P2 B2
P1
B1
Unfairness
❑ Using RTS/CTS/DATA/ACK or RTS/CTS/DS/DATA/ACK might cause unfairness
❑ A sends data to B; D sends data to C
❑ A and D have enough data to send
❑ C can hears from B and D, but not A
❑ B can hear from A and C, but not D
❑ A is in luck and gets the channel
❑ D sends RTS and times out
❑ Backoff window for D repeatedly doubles
❑ For the next transmission:
A picks a random number from a smaller window
Unequal probability of channel access
Throughput for flow A ➔B > 90 %
Throughput for flow D ➔ C ~ 0%
CTS
ACK
DATA
RTS
B C
D
A
44
Request for RTS (RRTS)
ACK
CTS
DATA
RTS
B
C
A D
45
Why Uses RRTS Instead Of CTS ?
❑ CTS or RTS packet size << data packet size
❑ When nodes overhear CTS, they need to defer a time period to allow the
expected data packet transmission
❑ When nodes overhear RRTS, they only need to defer a time period to
overhear the expected CTS
46
Why Multiple Stream MAC more fair Than Single Stream
MAC
❑ When collision
47
Backoff Algorithms
❑ When collision occurs, node A pick up a random number T from [1,Bo], then
retransmits RTS after T time unit
❑ How to determine Bo
❑ After each collision Bo_new = Fun_inc(Bo_old)
❑ After each successful transmission Bo_new = Fun_dec(Bo_old)
❑ When a node sends a packet, it embeds its current backoff counter in the
packet header. Other nodes which overhears the packet copy the value as itself
backoff counter
❑ Key idea: all nodes have the same backoff counter to achieve fairness
Open Problems
❑ Solution
❑Packet header has an additional field
carrying the current back-off counter
value of the transmitting node
❑A node receiving this packet copies this
value into its back-off counter
❑Allocates bandwidth in a fair manner
MACAW Protocol
2. Large variations in the back-off values
• the back-off window increases very rapidly and is reset
after each successful transmission
Solution
• multiplicative increase and linear decrease (MILD) back-
off mechanism (increase by factor 1.5)
• Upon collision back-off is increased by a multiplicative
factor 1.5
• Upon successful transmission, it is decremented by one
• Eliminates contention and hence long contention periods
after every successful transmission
• At the same time providing a reasonably quick escalation
in the back-off values when the contention is high
MACAW Protocol
3. Fairness
•MACA: per node fairness
• MACAW: per flow fairness (one back-off
value per flow)
Solution
• Done by maintaining multiple queues at
every node,
•one each for each data stream,
•and running the back-off algorithm
independently for each queue
MACAW Protocol
4. New control packet ACK is used
• In MACA responsibility of recovering from transmission errors lies
with the transport layer.
• In MACAW it lies with DLL
• If sender does not receive the ACK packet, it reschedules the same
data packet for transmission
• Back-ff counter is incremented if the ACK packet is not received by the
sender
• If ACK lost in transmission sender retry by transmitting RTS for the
same packet
• But now reciever send ACK packet instead of CTS and sender moves
on to transmit the next data packet
MACAW Protocol
5. New control packet type: data-sending (DS)
❑ General behavior
❑ When a node wants to transmit a packet,
it senses the channel to check whether
the busy tone is active
❑ If not, it turns on the busy tone signal and
starts transmission
reservation 1 2 3 4 5 6 7 8 time-slot
ACDABA-F frame1 A C D A B A F
ACDABA-F frame2 A C A B A
AC-ABAF- frame3 A B A F collision at
reservation
A---BAFD frame4 A B A F D attempts
t
ACEEBAFD frame5 A C E E B A F D
Contention-based protocols with Reservation
Mechanisms
❑ Collision avoidance time allocation protocol (CATA)
❑ based on dynamic topology-dependent transmission scheduling
❑ Nodes contend for and reserve time slots by means of a distributed
reservation and handshake mechanism.
❑ Support broadcast, unicast, and multicast transmissions.
❑ The operation is based on two basic principles:
The receiver(s) of a flow must inform the potential source nodes
about the reserved slot on which it is currently receiving packets.
The source node must inform the potential destination node(s)
about interferences in the slot.
Usage of negative acknowledgements for reservation requests,
and control packet transmissions at the beginning of each slot,
for distributing slot reservation information to senders of
broadcast or multicast sessions.
Contention-based protocols with Reservation
Mechanisms
❑ Properties
❑ One receiver per node, which can transmit and receive only one packet at
any given time
❑ Each transceiver is equipped with M
directional antennas
❑ Each antenna has a conical radiation
pattern spanning an angle of 2π/M radians
❑ Basic RTS/CTS scheme (as used in MACA)
MAC Protocol Using Directed Antennas
Power-Control MAC Protocol (PCM)
❑ Properties
❑ RTS/CTS are transmitted with maximum power pmax
❑ RTS-CTS handshake to determine the required transmission power pdesired
❑ RTS is received at the receiver with a signal level pr
❑ Calculation of pdesired
❑ Rxthresh is the minimum necessary received signal strength
❑ c … constant
known in advance
pmax
pdesired = Rxthresh * c
pr
measured
Power-Control MAC Protocol
RTS/CTS
range DATA/ACK
range
pmax
pdesired
1 2 3 4 5 6 7 8
Data
transmission
carrier sensing
range
Power-Control MAC Protocol
❑ Properties
❑ Adaptation to changing conditions, e.g. caused by mobility
❑ Instantaneous check and re-calculation of the necessary transmission power pdesired
❑ Collision avoidance
❑ Periodic bursts (after each EIFS) using pmax to notify neighbors about
ongoing transmissions
Other MAC Protocols