You are on page 1of 14

CONTENTS

Chapter One : Introduction 1.1 MANETS.....................................07 1.2 Applications..............................................................07 1.3 Challenges in MANETS................................08 Chapter Two : MAC Protocols for MANETS 2.1 Media Access Control.......................................0 2.2 !ss"es...........................0 2.2.1 #idden $ E%posed ter&inal pro'le&......................................................10 2.3 (oals......................................................11 2.) Classi*ications.....................................................................................................12 2.).1 Contention 'ased protocols...................................................................12 2.).2 Contention 'ased protocols +ith reser,ation &echanis&.....................1) 2.).2 Contention 'ased protocols +ith sched"ling &echanis&.....................1) 2.).3 -ther MAC protocols.............................................................................1. Conclusion..1/ References..17

[6

Chapter ! : INTRO"#CTION
!$! MANETS

1. A &o'ile ad0hoc net+or1 2MANET3 is *or&ed '4 a cl"ster o* &o'ile hosts +itho"t the in*rastr"ct"re o* 'ase stations. 5"e to the trans&ission range constraint *or a transcei,er6 t+o &o'ilehosts &a4 co&&"nicate +ith each other either directl46 i* the4 are close eno"gh6 or indirectl46 '4 ha,ing other inter&ediate &o'ile hosts rela4 their pac1ets. Since no 'ase station is re7"ired6 one o* its &ain ad,antages is that it can 'e rapidl4 deplo4ed. The applications o* MANETs appear in places +here pre0deplo4&ent o* net+or1 in*rastr"ct"re is di**ic"lt or "na,aila'le 2e.g.6 *leets in oceans6 ar&ies in &arch6 nat"ral disasters6 'attle *ields6 *esti,al *ield gro"nds6 and historicsites3. 2. !n Single hop +ireless connecti,it4 to the +ired +orld the space is di,ided into cells. A 'ase station is responsi'le to co&&"nicate +ith hosts in its cell. Mo'ile hosts can change cells +hile co&&"nicating. #and o** occ"rs +hen a &o'ile host starts co&&"nicating ,ia a ne+ 'ase station. 8hile in a M"lti0#op 8ireless connecti,it4 &a4 need to tra,erse &"ltiple lin1s to reach destination . The &o'ilit4 ca"ses ro"te to change. 3. !n MANETS 6 +e cater *or sit"ations +here the host &o,e&ent and topolog4 change is *re7"ent. There is no cell"lar in*rastr"ct"re and it "ses &"lti hop +ireless connecti,it4. The data are ro"ted ,ia inter&ediate nodes. ). Setting "p o* *i%ed access points and 'ac1'one in*rastr"ct"re is not al+a4s ,ia'le. !n*rastr"ct"re &a4 not 'e present in a disaster area or +ar 9one and &a4 not 'e practical *or short range radios 2:l"etooth 2range ; 10&33. Ad hoc net+or1s do not need 'ac1'one in*rastr"ct"re s"pport and are eas4 to deplo4. The4 are "se*"l +hen in*rastr"ct"re is a'sent6 destro4ed or i&practical.

!$%
1. 2. 3. ).

Applications
<ersonal area net+or1ing s"ch as cell phone6 laptop6 ear phone6 +rist +atch Militar4 en,iron&ents li1e in soldiers6 tan1s6 planes. Ci,ilian en,iron&ents s"ch as in ta%i ca' net+or16 &eeting roo&s6 sports stadi"&s6 'oats6 s&all aircra*ts. E&ergenc4 operations li1e in search and resc"e operations and policing and *ire *ighting. [&

!$'

Challen(es in MANETS

1.

As it is a +ireless net+or1 it inherits the traditional pro'le& o* +ireless net+or1ing: 2a3 The channel is "nprotected *ro& o"tside signal. 2'3 The +ireless &edia is "nrelia'le as co&pared to the +ired &edia. 2c3 #idden ter&inal and e%pose ter&inal pheno&enon &a4 occ"r. 2d3 The channel has ti&e ,ar4ing and as4&&etric propagation properties

2.

There are so&e other challenges and co&ple%ities: 2a3 The scala'ilit4 is re7"ired in MANET as it is "sed in &ilitar4 co&n6 'eca"se the net+or1 gro+s according to the need6so each&o'ile de,ice &"st 'e capa'le to handle the intensi*ication o* net+or1 and to acco&plish the tas1. 2'3 MANET is a in*rastr"ct"re less net+or16 there is no central ad&inistration. Each de,ice can co&&"nicate +ith e,er4 other de,ice6 hence it 'eco&es di**ic"lt to detect and &anage the *a"lts. !n MANET6 the &o'ile de,ices can &o,e rando&l4. The "se o* this d4na&ic topolog4 res"lts in ro"techanges6 *re7"ent net+or1 partitions and possi'l4 pac1et losses . 2c3 Each node in the net+or1 is a"tono&o"s= hence ha,e the e7"ip&ent *or radio inter*ace +ith di**erent trans&ission$ recei,ing capa'ilities these res"lts in as4&&etric lin1s. MANET "ses no ro"ter in 'et+een. 2d3 !n net+or1 e,er4 node acts as a ro"ter and can *or+ard pac1ets o* data other nodes to pro,ide in*or&ation parta1ing a&ong the &o'ile nodes. to

2e3 5i**ic"lt chore to i&ple&ent ad hoc addressing sche&e6 the MAC address o* the de,ice is "sed in the stand alone ad hoc net+or1. #o+e,er e,er4 application is 'ased on TC<$!< and >5<$!<.

[)

Chapter % : MAC Protocols for MANETS


%$! Media Access Control

1. A MAC 2&edi"& access control3 protocol is "sed to resol,e the potential contention and collision +hen "sing the co&&"nication &edi"&. !ts &ain ai& is to pro,ide *air access to shared 'roadcast radio channel. 2. Man4 MAC protocols ha,e 'een proposed *or +ireless net+or1s 6 +here a co&&on channel is ass"&ed to 'e shared '4 &o'ile hosts. 8e call s"ch protocols single0 channel MAC protocols. A standard that has 'een +idel4 accepted 'ased on the single0 channel &odel is the !EEE 802.11 . -ne co&&on pro'le& +ith s"ch protocols is that the net+or1 per*or&ance +ill degrade 7"ic1l4 as the n"&'er o* &o'ile hosts increases6 d"e to higher contention$collision.

%$%

Issues

1. *andwidth efficienc+ : !t is de*ined at the ratio o* the 'and+idth "sed *or act"al data trans&ission to the total a,aila'le 'and+idth. The MAC protocol *or ad0hoc net+or1s sho"ld &a%i&i9e it. 2. ,ualit+ of ser-ice s"pport is essential *or ti&e0critical applications. The MAC protocol *or ad0hoc net+or1s sho"ld consider the constraint o* ad0hoc net+or1s. 3. ). .. /. 7. S+nchroni.ation can 'e achie,ed '4 e%change o* control pac1ets. /idden and e0posed ter1inal pro2le1s$ Error3Prone Shared *roadcast Channel "istri2uted Nature45ac6 of Central Coordination Mo2ilit+ of Nodes: Nodes are &o'ile &ost o* the ti&e.

[7

%$%$!

/idden and E0posed Ter1inal Pro2le1

1. The radio inter*ace o* each node "ses 'roadcasting and copies +ith li&ited +ireless trans&ission range. Collisions and higher pro'a'ilit4 o* pac1et losses d"e to trans&ission errors are also speci*ics o* the +ireless &edi"&. The4 &a4 se,erel4 red"ce the channel "tili9ation and thro"ghp"t. The hidden and e%posed ter&inal pro'le& are a&ong the &ost re&ar1a'le pro'le&s posed in *ront o* thr CSMA$ CA 'ased MAC la4er design. 2. The hidden ter&inal pro'le& occ"rs +hen t+o or &ore ter&inals 6 +hich ha,e dis?oint trans&ission ranges start trans&itting to+ards the sa&e recie,er 2 eg. Node A and node C are dis?oint nodes trans&itting to+ards node :3. This res"lts in pac1et collision.

3. The e%posed ter&inal pro'le& occ"rs +hen a node 2 eg. Node C3 that *alls into the trans&ission range o* an acti,e node 2 eg. Node : trans&its to node A 3 +ants to start a trans&ission to another inacti,e node +ithin its range 6 '"t o"tside the range o* the acti,e node 2 eg. Node C +ants to trans&it to node 5 3 . According to the CSMA sche&e 6 the node has to postpone the trans&ission 6 +hich res"lts in thro"ghp"t decrease.

[!8

%$'
1. 2.

9oals
The operation o* the protocol sho"ld 'e distri'"ted. The protocol sho"ld pro,ide @oS s"pport *or real0ti&e tra**ic.

3. The access dela46 +hich re*ers to the a,erage dela4 e%perienced '4 an4 pac1et to get trans&itted6 &"st 'e 1ept lo+. ). .. /. The a,aila'le 'and+idth &"st 'e "tili9ed e**icientl4. The protocol sho"ld ens"re *air allocation o* 'and+idth to nodes. Control o,erhead &"st 'e 1ept as lo+ as possi'le.

7. The protocol sho"ld &ini&i9e the e**ects o* hidden and e%posed ter&inal pro'le&s. 8. . 10. 11. 12. The protocol &"st 'e scala'le to large net+or1s. !t sho"ld ha,e po+er control &echanis&s. The protocol sho"ld ha,e &echanis&s *or adapti,e data rate control. !t sho"ld tr4 to "se directional antennas. The protocol sho"ld pro,ide s4nchroni9ation a&ong nodes.

[!!

%$:

Classifications$

1. Medi"& access approaches can 'e contention0'ased and contention *ree. The &ost co&&onl4 considered contention 'ased approach is CSMA$ CA 2 carrier sense &"ltiple access +ith collision a,oidance3 and the &ost co&&onl4 considered contention *ree approach is T5MA 2 ti&e di,ision &"ltiple access3. 2. 8e in this pro?ect consider contention 'ased &edi"& access control. Collision a,oidance is an i&portant iss"e in this. Contention 'ased adhoc +ireless net+or1ing protocols can 'e classi*ied into : 2a3 2'3 2c3 2d3 Contention 'ased protocols. Contention 'ased protocols +ith reser,ation &echanis&s. Contention 'ased protocols +ith sched"ling &echanis&s. -ther protocols.

%$:$!

Contention 2ased protocols

1. Contention 'ased protocols do not ha,e an4 'and+idth reser,ation &echanis&s and *ollo+ a contention 'ase channel access polic4 . All nodes contend *or the channel si&"ltaneosl4 and the +inning node gains the access to the channel. The contention 'ased protocols can ha,e a carrier sensing operations and $or colllision a,oidance dialog 'et+een the sender and the intended recie,er. There is no 'and+idth g"arantee6 +hich &a1es these protocols in appropriate *or trans&itting real ti&e tra**ic and ena'ling @oS g"aranties. 2. The4 can 'e sender initiated 2 sender initiate pac1et trans&ission 6 eg. MACA8 6 AAMA 3 or recie,er initiated 2 recie,er initiate contention resol"tion protocol6 eg. MACA 0:! 6 MABC#3. Sender initiated protocols can 'e single channel or &"lti channel . !n single0channel6 a node that +ins the contention to the channel can &a1e "se o* the entire 'and+idth. !n &"lti channel 6 the a,aila'le 'and+idth is di,ided into &"ltiple channels depending "pon ho+ &"ch a,aila'le 'and+idth is act"all4 "sed.

[!%

3. >sing &"ltiple channels has se,eral ad,antages. Airst6 +hile the &a%i&"& thro"ghp"t o* a single0channel MAC protocol +ill 'e li&ited '4 the 'and+idth o* the channel6 the thro"ghp"t &a4 'e increased i&&ediatel4 i* a host is allo+ed to "tili9e &"ltiple channels. Aor e%a&ple6 there are 3 or ) non0o,erlapping channels in !EEE 802.11'. !* onl4 one channel is "sed6 the total thro"ghp"t +ill 'e li&ited. Second6 "sing &"ltiple channels +ill e%perience less nor&ali9ed propagation dela4 per channel than the single0channel co"nterparts6 +here the nor&ali9ed propagation dela4 is de*ined to 'e the ratio o* the propagation ti&e o,er the pac1et trans&ission ti&e. There*ore6this red"ces the pro'a'ilit4 o* collisions. ). !n +ireless ad hoc net+or1s that rel4 "pon a carrier sensing rando& access approach 2eg. 802.11 5CA3 6 appropriate sol"tion to hidden ter&inal pro'le& has to 'e *o"nd. According to 5CA 6 the station &"st sense the channel 'e*ore starting its o+n trans&ission . !* the &edi"& is *o"nd idle *or an inter,al longer than distri'"ti,e inter *ra&e space 25!AS3 6 the station starts the trans&ission6 other+ise the station &"st contin"e &onitoring the &edi"& "ntil it is *o"nd idle &ore than a 5!AS period. Then the station +aits *or a rando& 'ac1 o** inter,al. A*ter the rando& 'ac1 o* inter,al e%pires6 the station starts trans&ission 6 '"t onl4 i* the &edi"& is sensed *ree. !* the &edi"& is sensed '"s46 'ac1 o** proced"re is in,o1ed again +hich is i&ple&ented "sing &an4 &edis access protocols. .. The hidden ter&inal pro'le& can 'e red"ced '4 e%tending the 5CA 'asic &echanis& thro"gh a ,irt"al carrier sensing. The trans&ission phase is preceded +ith t+o control *ra&es 6 BTS and CTS6 to anno"nce the "pco&ing *ra&e trans&ission to the recie,er and to indicate recie,erCs readines to recie,e the data *ra&es. This handsha1ing dialog generall4 red"ces the collisions and i&pro,es the s4ste& per*or&ances 6 '"t introd"ces so&e dela4 and o,erheads. !* ac1no+ledge&ent &echanis& is i&ple&ented6 then the recie,ing station sends the ac1 *ra&e 2ACD3 a*ter s"ccess*"l reception o* data *ra&e and +aiting *or a short inter *ra&e space 2S!AS3 inter,al. /. So&e e%a&ples o* contention 'ased MAC protocol are AAMA 6 :TMA 6 MACA0:! . MACA 6 MACA8 6

[!'

%$:$%

Contention ; 2ased protocols with reser-ation 1echanis1

1. These are &ostl4 'ased on T5MA philosoph4 and i&ple&ent &echanis&s *or reser,ing 'and+idth in order to s"pport real ti&e tra**ic and pro,ide @oS g"arantees. The4 can re7"ire s4nchroni9ation a&ong all nodes in the net+or1 2 S4nchrono"s protocols3 or "se relati,e ti&e in*or&ation *or e**ecting reser,ations 2 As4nchrono"s protocols3. 2. Contention occ"rs d"ring the reso"rce 2'and+idth3 reser,ation phase. -nce the 'and+idth is reser,ed6 the node gets e%cl"si,e access to the reser,ed 'and+idth. -ne o* the e%a&ple is 50<BMA 2 5istri'"ted pac1et reser,ation &"ltiple access3. 3. 5istri'"ted pac1et reser,ation &"ltiple access protocol 250<BMA3 e%tends the centrali9ed pac1et reser,ation &"ltiple access 2<BMA3 sche&e into a distri'"ted sche&e that can 'e "sed in ad hoc +ireless net+or1s. <BMA +as designed in a +ireless EAN +ith a 'ase station. 50<BMA e%tends <BMA protocol in a +ireless EAN. 50<BMA is a T5MA 'ased sche&e. The channel is di,ided into *i%ed and e7"al0si9ed *ra&es along the ti&e a%is. ). BTS$:! 2 '"s4 indication3 and CTS$:! *ields "sed to place the re7"ire&ents and a,oid hidden ter&inal pro'le&. .. So&e e%a&ples o* contention 'ased protocols +ith reser,ation &echanis&s are 50<BMA6 CATA6 #BMA 6 MACA$<B .

%$:$'

Contention ; 2ased protocols with schedulin( 1echanis1

1. !t *oc"s on nodes channel access trans&ission sched"ling 6 pro,iding *air treat&ent o* all nodes and on pac1et sched"ling en*orcing priorities 'et+een di**erent pac1et *lo+s . These &echanis&s can ta1e into consideration ,ario"s *actors that can in*l"ence net+or1 per*or&ance li1e 6 re&aining 'atter4 po+er at nodes 6 pac1et dela4 6 tra**ic load 6 etc. 2. Most o* these protocols are 'ased on t+o 'asic sche&es : distri'"ted priorit4 sched"ling 25<S3 and &"ltihop coordination. The 5<S is 'ased on the !EEE 802.11 distri'"ted coordination *"nction &echanis&s co&'ined +ith pigg4'ac1ing the priorit4 in*or&ation on BTS$ CTS$ 5ATA$ ACD pac1ets. The trans&itting pac1ets "pdate the sched"ling ta'le +ith priorit4 tags 6 &ar1ing each so"rce F destination pair. Each nodeCs sched"ling ta'le gi,es the ran1 o* the node +.r.t other nodes in the neigh'orhood. [!:

3. M"lti hop sche&es 'alance the priorit4 inde% 'et+een "p0stre& and do+n0 strea& pac1ets achie,ing 'etter end to end dela4 per*or&ance. These sche&es can "tili9e the ti&e sensiti,e tra**ic on adhoc +ireless net+or1s. ). Gariations o* these &echanis&s in di**erent sched"ling MAC protocols 6 s"ch as 58-< and 5E<S. Adapti,e approach and co&'ination +ith other techni7"es can *"rther enhance the possi'iliies *or corrections in end to end dela4 and @oS.

%$:$:

Other MAC protocols

1. There are n"&'er o* MAC protocols that cannot 'e strictl4 classi*ied into pre,io"sl4 &entioned categories. 2. There are MAC protocols that "se directional antennas to i&pro,e the thro"ghp"t and directional '"s4 tone 'ase MAC protocol that i&pro,es the spectral re"se and increase the channel capacit4. 3. Another i&portant gro"p o* MAC protocols are po+er control protocols.

). There are protocols that deals +ith &"ltihop connections and resol,e the "se o* &"ltiple channels *or data trans&ission 2MMAC3.

[!<

CONC5#SION
1. MAC la4er &echanis&s are responsi'le *or the nodesC access to the channel and a**ect the o,erall net+or1 per*or&ances. Earge n"&'er o* proposed protocils is '"ilt "p "pon di**erent approaches and target di**erent goals. The4 all contri'"te to &ore e**icient net+or1ing sol"tions *or speci*ic +ireless en,iron&ent and adhoc co&&"nications. Hoint design +ith ph4sical la4er and lin1 la4er can contri'"te to higher e**icienc4 and relia'ilit4. The MAC la4er together +ith lin1 la4er can pla4 i&portant role in cross0la4er design.

[!6

RE=ERENCES
[! E (a,rilo,s1a and B . <rasad CAdhoc networ6in( towards sea1less co11unications > ? springer p"'ications. [% <rasant Mohapatra and Sri1anth Drisshna&"rth4 CAdhoc 1etwor6s technolo(ies and protocols > 6 springer p"'lications. [' C. D Toh CAdhoc 1o2ile wireless networ6s protocols and s+ste1s> ? pearson p"'lications. [: Sridhar !4er 6 !!T :o&'a4 > Mo2ile Adhoc Networ6> 6 http:$$+++.it.iit'.ernet.in.in$;sri.

[!&

You might also like