SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Ad-hoc & Sensor Based Networks
ECE752
P. Uday Ashish
M. Tech (E&C)
A2315320006
Contention based MAC Protocols
 These protocols follow a contention based channel access policy. Resource
reservation is not a priority
 Whenever a nodes receives a packet to be transmitted it contends with it
neighbor nodes for access to the shared channel
 These protocols cannot provide QoS guarantees since the nodes are not
guaranteed regular access to the channel
 Two Types: -
• Sender Initiated
• Receiver Initiated
MACA (Multiple Access with Collision Avoidance)
RTS: Request to Send
CTS : Clear to Send
• After receiving an RTS
from the sender all
terminal will defer until a
CTS packet is received by
the sender
• All terminals hearing CTS
defer for the length of data
transmission
• Binary Exponential Back off (BEB)
Algorithm is used in MACA
• It maintains a Back off Counter (BO)
• After every collision BO is doubled
• After every successful RTS-CTS exchange
BO is reduced to minimal.
Limitations: -
• No ACK Packet
• Unfair sharing of bandwidth
MACAW (MACA for Wireless)
RTS: Request to Send
CTS : Clear to Send
ACK: Acknowledgment
DS: Data Sending
RRTS: Ready for RTS
• After receiving an RTS from the sender all
terminal will defer until a CTS packet is
received by the sender
• All terminals hearing CTS defer for the length
of data transmission
• Neighbor terminals defer until an ACK packet
is received after data transmission
• Multiplicative Linear Increase & Decrease
(MILD) Algorithm is used in MACAW
• After every collision BO is multiplied by
1.5 units of time
• After every successful RTS-CTS exchange
BO is decreased by 1 unit of time.
Advantages over MACA
• Has an ACK Packet
• Hidden & exposed terminal problem
are handled
Limitations: -
• Does not completely solve hidden &
exposed node problem
MACA-BI (MACA By Invitation)
RTR: Ready to receive
• Receiver initiated Protocol
• Data transmission occurs
through a two way
handshake mechanism
• Requires information
about the traffic at
neighboring nodes
Limitations: -
• Cannot work properly with irregular traffic
BTMA (Busy Tone Multiple Access)
• Proposed for overcoming hidden
terminal problem
• Uses a busy tone
• Transmission channel is split into 2 –
 Data Channel
 Control Channel
• Low probability of collision
DBTMA (Dual Busy Tone Multiple Access)
• Transmission channel is split into 2 –
 Data Channel – Data Packet
Transmission
 Control Channel – RTS, CTS, Busy Tones
• Two busy tones BTt & BTr are used
• Low probability of collision
• Exhibits better network utilization
RI-BTMA (Receiver Initiated Busy Tone Multiple Access)
• Data packet is divided into two
portions- Preamble
Actual data Packet
• Preamble carries identification of the
intended destination node
• Data and control channels are slotted,
with each slot equal to the size of
preamble
Comparison
MAC Protocols Hidden & exposed issues Throughput Fairness Signals Used Channel Type
MACA Not Solved Poor RTS, CTS Single Channel Sender Initiated
MACAW Not Solved Higher than MACA RTS, CTS, ACK Single Channel Sender Initiated
MACA-BI Partially Solved Fair RTR Single Channel Receiver Initiated
BTMA Solved Average Busy Tone Multiple Channel Sender Initiated
DBTMA Solved Average RTS, CTS, Busy Tone Multiple Channel Sender Initiated
RI-DBTMA Solved Average RTS, CTS, Busy Tone Multiple Channel Receiver Initiated
Adhoc

Weitere ähnliche Inhalte

Was ist angesagt?

Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocolCCNAStudyGuide
 
Pause frames an overview
Pause frames an overviewPause frames an overview
Pause frames an overviewMapYourTech
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocoleSAT Journals
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit iiJAIGANESH SEKAR
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...MNIT Jaipur
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...Osama M Askoura
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routingCYBERINTELLIGENTS
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Ronoh Kennedy
 
VLAN (Virtual Local Area Network)
VLAN (Virtual Local Area Network)VLAN (Virtual Local Area Network)
VLAN (Virtual Local Area Network)NetProtocol Xpert
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layerGOURAV KUMAR
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 

Was ist angesagt? (20)

Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Pause frames an overview
Pause frames an overviewPause frames an overview
Pause frames an overview
 
Importance of sliding window protocol
Importance of sliding window protocolImportance of sliding window protocol
Importance of sliding window protocol
 
Computer networks unit ii
Computer networks    unit iiComputer networks    unit ii
Computer networks unit ii
 
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
Wireless Communications and a Priority Access Protocol for Multiple Mobile Te...
 
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
6590 Research Paper Review: MAC Protocol for Multi-Hop Multicast in Adhoc Net...
 
Icmp
IcmpIcmp
Icmp
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Swvlan
SwvlanSwvlan
Swvlan
 
Day 8 2 distance vector routing
Day 8 2 distance vector routingDay 8 2 distance vector routing
Day 8 2 distance vector routing
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
VLAN (Virtual Local Area Network)
VLAN (Virtual Local Area Network)VLAN (Virtual Local Area Network)
VLAN (Virtual Local Area Network)
 
Wireless networks ..mac layer
Wireless networks ..mac layerWireless networks ..mac layer
Wireless networks ..mac layer
 
Is 41 network signaling
Is 41 network signalingIs 41 network signaling
Is 41 network signaling
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
Data link layer tutorial
Data link layer tutorialData link layer tutorial
Data link layer tutorial
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

Ähnlich wie Adhoc

Ähnlich wie Adhoc (20)

Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
mac-adhoc.ppt
mac-adhoc.pptmac-adhoc.ppt
mac-adhoc.ppt
 
Chapter 6 MAC.pdf
Chapter 6 MAC.pdfChapter 6 MAC.pdf
Chapter 6 MAC.pdf
 
Mediumaccesscontrol
MediumaccesscontrolMediumaccesscontrol
Mediumaccesscontrol
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
CAN.ppt
CAN.pptCAN.ppt
CAN.ppt
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Lect04
Lect04Lect04
Lect04
 
14653128.ppt
14653128.ppt14653128.ppt
14653128.ppt
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
wireless networks
wireless networkswireless networks
wireless networks
 
Sensys ch5-mac
Sensys ch5-macSensys ch5-mac
Sensys ch5-mac
 
Packet Switching Technique in Computer Network
Packet Switching Technique in Computer NetworkPacket Switching Technique in Computer Network
Packet Switching Technique in Computer Network
 

Kürzlich hochgeladen

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Kürzlich hochgeladen (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

Adhoc

  • 1. Ad-hoc & Sensor Based Networks ECE752 P. Uday Ashish M. Tech (E&C) A2315320006 Contention based MAC Protocols
  • 2.
  • 3.  These protocols follow a contention based channel access policy. Resource reservation is not a priority  Whenever a nodes receives a packet to be transmitted it contends with it neighbor nodes for access to the shared channel  These protocols cannot provide QoS guarantees since the nodes are not guaranteed regular access to the channel  Two Types: - • Sender Initiated • Receiver Initiated
  • 4. MACA (Multiple Access with Collision Avoidance) RTS: Request to Send CTS : Clear to Send • After receiving an RTS from the sender all terminal will defer until a CTS packet is received by the sender • All terminals hearing CTS defer for the length of data transmission
  • 5. • Binary Exponential Back off (BEB) Algorithm is used in MACA • It maintains a Back off Counter (BO) • After every collision BO is doubled • After every successful RTS-CTS exchange BO is reduced to minimal. Limitations: - • No ACK Packet • Unfair sharing of bandwidth
  • 6. MACAW (MACA for Wireless) RTS: Request to Send CTS : Clear to Send ACK: Acknowledgment DS: Data Sending RRTS: Ready for RTS • After receiving an RTS from the sender all terminal will defer until a CTS packet is received by the sender • All terminals hearing CTS defer for the length of data transmission • Neighbor terminals defer until an ACK packet is received after data transmission
  • 7. • Multiplicative Linear Increase & Decrease (MILD) Algorithm is used in MACAW • After every collision BO is multiplied by 1.5 units of time • After every successful RTS-CTS exchange BO is decreased by 1 unit of time. Advantages over MACA • Has an ACK Packet • Hidden & exposed terminal problem are handled Limitations: - • Does not completely solve hidden & exposed node problem
  • 8. MACA-BI (MACA By Invitation) RTR: Ready to receive • Receiver initiated Protocol • Data transmission occurs through a two way handshake mechanism • Requires information about the traffic at neighboring nodes
  • 9. Limitations: - • Cannot work properly with irregular traffic
  • 10. BTMA (Busy Tone Multiple Access) • Proposed for overcoming hidden terminal problem • Uses a busy tone • Transmission channel is split into 2 –  Data Channel  Control Channel • Low probability of collision
  • 11. DBTMA (Dual Busy Tone Multiple Access) • Transmission channel is split into 2 –  Data Channel – Data Packet Transmission  Control Channel – RTS, CTS, Busy Tones • Two busy tones BTt & BTr are used • Low probability of collision • Exhibits better network utilization
  • 12. RI-BTMA (Receiver Initiated Busy Tone Multiple Access) • Data packet is divided into two portions- Preamble Actual data Packet • Preamble carries identification of the intended destination node • Data and control channels are slotted, with each slot equal to the size of preamble
  • 13. Comparison MAC Protocols Hidden & exposed issues Throughput Fairness Signals Used Channel Type MACA Not Solved Poor RTS, CTS Single Channel Sender Initiated MACAW Not Solved Higher than MACA RTS, CTS, ACK Single Channel Sender Initiated MACA-BI Partially Solved Fair RTR Single Channel Receiver Initiated BTMA Solved Average Busy Tone Multiple Channel Sender Initiated DBTMA Solved Average RTS, CTS, Busy Tone Multiple Channel Sender Initiated RI-DBTMA Solved Average RTS, CTS, Busy Tone Multiple Channel Receiver Initiated