1 / 12

KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT

KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT. MAC Protocols in ad hoc networks Rami Bakhsh 200319130 Mohammed Al-Farsi 200164630 References: http://www.moeforum.net Mobile Ad Hoc Networks by Faisal Aslam and Chia Ching Ooi

meaghan
Download Presentation

KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALSELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh 200319130 Mohammed Al-Farsi 200164630 References: http://www.moeforum.net Mobile Ad Hoc Networks by Faisal Aslam and Chia Ching Ooi Ad Hoc Wireless Media Access Protocols by Mikko Raatikainen

  2. OUTLINE Introduction MAC Layer In Ad hoc network MAC Protocols Hidden Terminal Problem Exposed Terminal Problem MACA Protocol Conclusions

  3. Introduction Definition of the ad hoc network Consists of mobile nodes which communicate with each other through wireless medium without any fixed Infrastructure. http://www.moeforum.net

  4. Important Features of ad hoc networks The network topology Every nodes may be mobile node Limited power Limited wireless bandwidth The channel quality is varibale No centralized units

  5. MAC Layer In Ad hoc network MAC Layer: For sharing a single broadcast medium among multiple users. Concerned with per-link connections. Error detection and correction by using Cyclic redundancy checks, Parity schemes. Flow control. There are two types of MAC : Static MAC Dynamic MAC

  6. MAC Protocols

  7. Hidden Terminal Problem Two nodes transmit concurrently data to the same receiver => collision Use RTS and CTS control packets. A B C Mobile Ad Hoc Networks by Faisal Aslam and Chia Ching Ooi

  8. Exposed Terminal Problem overhearing data transmission from neighboring nodes. A B C D Mobile Ad Hoc Networks by Faisal Aslam and Chia Ching Ooi

  9. MACA Protocol Inspired by the CSMA/CA method ‌Extension to the CA part of the CSMA/CA Lack of carrier doesn’t always mean it’s OK to transmit ‌Presence of carrier doesn’t always mean it’s bad to transmit.

  10. MACA and Hidden & Exposed Terminals Problems Ad Hoc MAC Protocol (Pusan)

  11. Improvements of MACA Protocol MACA (1990) No carrier sensing. MACAW (1994) MACA with Wireless networks. Includes ACK for the fast error recovery. FAMA (1995) RTS-CTS exchange with non-persistent Carrier Sensing. MACA-BI (1997) Receiver initiative two-way handshake: RTR-Data.

  12. Conclusions Different kinds of MAC protocols for different problems. There are new protocols inspired

More Related