30
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb

Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb

  • View
    220

  • Download
    5

Embed Size (px)

Citation preview

Wireless Medium Access Control Protocols

A Survery by Ajay Chandra V. Gummalla and John O. Limb

Introduction

Survey Distributed vs. Centralized Networks Wireless MAC Issues

Low Power Sensor Nodes Random Access Guaranteed Access Hybrid Access

Introduction Cont’d.

Distributed MAC Protocols Distributed Foundation Wirelesss MAC

(DFWMAC) Eliminate Yield – Non-Preemptive

Priority Multiple Access (EY-NPMA)

Introduction Cont’d.

Centralized MAC Protocols Random Access

Idle Sense Multiple Acces (ISMA) Randomly Addressed Polling (RAP) Resource Auction Multiple Access (RAMA)

Guaranteed Access Zhang’s and Acampora’s Proposals Disposable Token MAC Protocol (DTMP)

Introduction Cont’d. Hybrid Access

Random Reservation Protocols (RRA) Packet Reservation Multiple Access (PRMA) Random Reservation Access – Independent

Stations Algorithm (RRA-ISA) Distributed Queuing Request Updated

Multiple Access (DQRUMA) Moble Access Scheme based on Contention

and Reservation for ATM (MASCARA)

Introduction Cont’d. Dynamic Slot Assignment ++ (DSA++)

Distributed Wireless Network

ad hoc network No central administration Multi-hop wireless networks Wireless Sensor Nets

Centralized Wireless Network

Last Hop Network Very common

Corporate, Academic, and Cellular uses.

Has a controlling Base Station, with variable intelligence Wireless Access Point Cellular Tower

Wireless MAC Issues Half-Duplex

No Collision Detection Uplink and Downlink must be multiplexed

Time Varying Channel Reflection, Diffraction, and Scattering Different version of signal are superimposed

on each other Multipath Propagation Coherence Time = time signal strength

changes by 3dB

Wireless MAC Issues Cont’d.

Burst Channel Errors Higher BER Errors occur in long bursts Link Layer retransmission based on

immediate ACKs

Wireless MAC Issues Cont’d. Location Dependent Carrier Sensing

Hidden Nodes: Node A doesn’t know Node B is also talking to BS

Exposed Nodes: Node A knows node B is talking, but doesn’t know that it will not affect Node A’s conversation with BS

Capture: Node A and B are both transmitting to BS, but since Node A’s signal strength is stronger Node A’s transmission is used no collision is detected.

Random Access

Random Access is based on a “Talk whenever you want” way of thinking

Collisions are resolved by a contention resolution algorithm

Distributed Networks

Guaranteed Access

Access to medium is scheduled Round Robin Master/Slave (Polling) Tokens TDMA, FDMA

Hybrid Access

Melds best qualities of Random and Guaranteed Access

Request-Grant mechanisms Requests are Random Access, and

once reserved transmission is guaranteed

Random Reservation Access Demand Assignment

Distributed Foundation Wireless MAC (DFWMAC)

802.11 Standard 4-way exchange: RTS-CTS-DATA-ACK No ACK causes sender to retransmit No CTS causes exponential backoff RTS and CTS contain a NAV which

details how much data is to be sent

Elimination Yield – Non-Preemptive Priority Multiple Access (EY-NPMA)

HIPERLAN Sense channel for time to send

(TTS) 1700 bits, if clear, then send If busy, N slots; When done listen

again If still busy, abort; Else listen again,

and if not busy then transmit until finished

Idle Sense Multiple Access (ISMA) Carrier Sensing and Collision detection

are performed by the BS When medium is idle BS broadcasts idle

signal (IS) Nodes with data send If collision BS cannot decode signal, does

not send ACK and broadcasts IS again Otherwise BS sends ACK/ISA (ISA) Efficiency is improved by using small

Reservation packets

Randomly Address Polling (RAP)

Nodes with data broadcast orthogonal “codes” simultaneously

BS receives all codes, using a CDMA receiver

BS then polls each code All nodes with that code transmit If only one node the BS sends ACK More than one node with code causes BS to

send NACK Reservation RAP supports nodes with

streaming traffic

Resource Auction Multiple Access (RAMA)

Each node has and N-bit ID and transmits it, in contention phase

BS then echos back ID it heard bit-by-bit Once a node receives a bit it did not

transmit, it drops out Since BS does an OR operation on

received IDs then node with highest ID always wins

Zhang’s Proposal

BS polls each node for data, round robin

Node responds with data request, or a keep alive if queue is empty

BS then polls each node that responded with a data request

Disposable Token MAC Protocol (DTMP)

Improves on Zhang’s proposal When polling nodes BS indicates if it

has data to send to nodes If no data, then remain silent Otherwise send short message Transmit any data to send Channel is assumed to be reciprocal

Acampora’s Proposal Poll, request, data phases BS polls each node, if the node has

data to sends it responds The BS the broadcasts this nodes

ID so that all nodes know the order in which to send

BS then polls nodes each node in turn for its data

Random Reservation Protocols (RRA)

Uplink is time slotted Each slot large enough to carry one

voice packet Downlink is broadcast channel Nodes use random access to request

reservations for data to send BS enforces a policy of reservations

Stream Reservation Complete BS scheduling

Packet Reservation Multiple Access (PRMA)

A node with a back-logged voice packet transmits with probability p

If successful, reserves that slot for following packets

Data is similar, though no reservations are made Different access probabilities are used for voice

and data Introduction of data packets into voice only

network decreases efficiency Improvements include limited data reservations,

separating voice and data channels (FRMA), separating request and data channels (PRMA++)

Centralized PRMA uses scheduling to achieve QOS

Random Reservation Access – Independent Stations Algorithm

(RRA-ISA)

BS polls a subset of all nodes Subset is defined by the probability

of a single transmission in a slot is maximized

BS uses channel history to compute subsets

Distributed-Queuing Request Update Multiple Access

(DQRUMA)

Uplink and Downlink are duplexed Uplink has request channel and packet

channel Request channel is for contention requests Packet channel is for data (and piggyback

new contention requests) Downlink has 3 messages: ACK for

current slot, transmission permission for node to use next uplink slot, and data to the nodes

Better than RAMA and PRMA

Mobile Access Scheme based on Contention and Reservation for ATM

(MASCARA)

Frame consists of three periods: broadcast, reserved, and contention

Broadcast informs nodes of structure of current frame and scheduled uplink transmissions

Reserved period consists of downlink data, and uplink data as defined in broadcast period

Contention is random access and used to send new requests to BS

Dynamic Slot Assignment++ (DSA++)

MAC on uplink is TDMA Both uplink and downlink are slotted Each downlink slot contains some data

and a MAC message MAC message contains ACK for

transmission on previous uplink slot and a reservation for next uplink slot

BS collects all requests and schedules uplink transmissions

Comparison Summary

Comparisons QoS guarantees are not suited to

Random Access protocols because delay cannot be bounded

Demand Assignment protocols are best suited to multimedia applications

Random Access lends itself to large networks

Polling protocols are efficient only for smaller networks

TDD protocols perform poorly at high data rates due to increase in switching