Beruflich Dokumente
Kultur Dokumente
Lecture (7-8)
Chandra Prakash
Assistant Professor
LPU
A B C
Laptops
radio obstruction
Wireless
D LAN
Palmtop E
LAN
2 types of links:
Point-to-point.
Shared.
If more than 1 node transmits at the same time:
Collision at receiver!
MAC protocol:
Arbitrate access to medium.
Determine who can transmit when.
Controlled access
Stations coordinate access to channel.
Station only transmits when it has right to send.
Channelization
Bandwidth of channel is statically partitioned.
A B C
A starts sending to B.
C senses carrier, finds medium in
use and has to wait for A->B to
end.
D is outside the range of A, B
A
therefore waiting is not necessary. D
C
A and C are “exposed” terminals
Use of Antennas
Directional antennas
Examples:
MACA (Multiple Access with Collision Avoidance),
MACAW (MACA with Acknowledgment), and
FAMA (Floor Acquisition Multiple Access).
data
ACK
For example,
If node A has been sending data packets to node B, after some time, A
would know how much power it needs to reach B.
If node A overhears node B's response to an RTS (i.e., a CTS) from a
downstream node C, A need not remain completely silent during this
time.
By lowering its transmission power from the level used to reach node
B, node A can communicate with other neighboring nodes (without
43 Chandrainterfering with node
prakash, Lovely Professional B) during
University, Punjab that time with a lower power.
MACA examples
MACA avoids the problem of hidden terminals
A and C want to
send to B
A sends RTS first RTS
In MACA , an exposed node can received only the RTS and not the
CTS packet
49
MACAW
Chandra : RTS-CTS-DS-DATA-ACK
prakash, Lovely Professional University, Punjab exchange mechanism
2. MACA-BI (By Invitation)
MACA-BI uses only a two-way handshake.
No RTS. , the CTS message is renamed as RTR (Ready To
Receive).
Type Receiver initiated MAC Protocol
A node cannot transmit data unless it has received an
invitation from the receiver.
Receiver node does not necessarily know that the source has data
to transmit.
receiver needs to predict if node has data to transmit to it.
The timeliness of the invitation will affect communication
performance.
BT(t) used by the node that transmits data over the data channel
When the base station receives packets from a specific mobile host, it
sends out a busy tone signal to all other nodes within its radio cell.
Hence, hidden terminals sense the busy tone and refrain from
transmitting
Zygmunt Haas from Cornell applied this concept further for use in ad hoc
wireless networks
59 Chandra prakash, Lovely Professional University, Punjab
DBTMA (Cont…)
An ad hoc node wishing to transmit first sends out an RTS message.
When the receiver willing to accept the data, it sends out a receive busy
tone message followed by a CTS message.
All neighboring nodes that hear the receive busy tone are prohibited from
transmitting.
Upon receiving the CTS message, the source node sends out a
transmit busy tone message to surrounding nodes prior to data
transmission.
Neighboring nodes that hear the transmit busy tone, are prohibited from
transmitting and will ignore any transmission received.
60 Chandra prakash, Lovely Professional University, Punjab
Dual Busy Tone Multiple Access (DBTMA)