Wireless Medium Access Control Protocols
E N D
Presentation Transcript
Wireless Medium Access Control Protocols A Survery by Ajay Chandra V. Gummalla and John O. Limb
Introduction • Survey • Distributed vs. Centralized Networks • Wireless MAC Issues • Low Power Sensor Nodes • Random Access • Guaranteed Access • Hybrid Access
Introduction Cont’d. • Distributed MAC Protocols • Distributed Foundation Wirelesss MAC (DFWMAC) • Eliminate Yield – Non-Preemptive Priority Multiple Access (EY-NPMA)
Introduction Cont’d. • Centralized MAC Protocols • Random Access • Idle Sense Multiple Acces (ISMA) • Randomly Addressed Polling (RAP) • Resource Auction Multiple Access (RAMA) • Guaranteed Access • Zhang’s and Acampora’s Proposals • Disposable Token MAC Protocol (DTMP)
Introduction Cont’d. • Hybrid Access • Random Reservation Protocols (RRA) • Packet Reservation Multiple Access (PRMA) • Random Reservation Access – Independent Stations Algorithm (RRA-ISA) • Distributed Queuing Request Updated Multiple Access (DQRUMA) • Moble Access Scheme based on Contention and Reservation for ATM (MASCARA)
Introduction Cont’d. • Dynamic Slot Assignment ++ (DSA++)
Distributed Wireless Network • ad hoc network • No central administration • Multi-hop wireless networks • Wireless Sensor Nets
Centralized Wireless Network • Last Hop Network • Very common • Corporate, Academic, and Cellular uses. • Has a controlling Base Station, with variable intelligence • Wireless Access Point • Cellular Tower
Wireless MAC Issues • Half-Duplex • No Collision Detection • Uplink and Downlink must be multiplexed • Time Varying Channel • Reflection, Diffraction, and Scattering • Different version of signal are superimposed on each other • Multipath Propagation • Coherence Time = time signal strength changes by 3dB
Wireless MAC Issues Cont’d. • Burst Channel Errors • Higher BER • Errors occur in long bursts • Link Layer retransmission based on immediate ACKs
Wireless MAC Issues Cont’d. • Location Dependent Carrier Sensing • Hidden Nodes: Node A doesn’t know Node B is also talking to BS • Exposed Nodes: Node A knows node B is talking, but doesn’t know that it will not affect Node A’s conversation with BS • Capture: Node A and B are both transmitting to BS, but since Node A’s signal strength is stronger Node A’s transmission is used no collision is detected.
Random Access • Random Access is based on a “Talk whenever you want” way of thinking • Collisions are resolved by a contention resolution algorithm • Distributed Networks
Guaranteed Access • Access to medium is scheduled • Round Robin • Master/Slave (Polling) • Tokens • TDMA, FDMA
Hybrid Access • Melds best qualities of Random and Guaranteed Access • Request-Grant mechanisms • Requests are Random Access, and once reserved transmission is guaranteed • Random Reservation Access • Demand Assignment
Distributed Foundation Wireless MAC (DFWMAC) • 802.11 Standard • 4-way exchange: RTS-CTS-DATA-ACK • No ACK causes sender to retransmit • No CTS causes exponential backoff • RTS and CTS contain a NAV which details how much data is to be sent
Elimination Yield – Non-Preemptive Priority Multiple Access (EY-NPMA) • HIPERLAN • Sense channel for time to send (TTS) 1700 bits, if clear, then send • If busy, N slots; When done listen again • If still busy, abort; Else listen again, and if not busy then transmit until finished
Idle Sense Multiple Access (ISMA) • Carrier Sensing and Collision detection are performed by the BS • When medium is idle BS broadcasts idle signal (IS) • Nodes with data send • If collision BS cannot decode signal, does not send ACK and broadcasts IS again • Otherwise BS sends ACK/ISA (ISA) • Efficiency is improved by using small Reservation packets
Randomly Address Polling (RAP) • Nodes with data broadcast orthogonal “codes” simultaneously • BS receives all codes, using a CDMA receiver • BS then polls each code • All nodes with that code transmit • If only one node the BS sends ACK • More than one node with code causes BS to send NACK • Reservation RAP supports nodes with streaming traffic
Resource Auction Multiple Access (RAMA) • Each node has and N-bit ID and transmits it, in contention phase • BS then echos back ID it heard bit-by-bit • Once a node receives a bit it did not transmit, it drops out • Since BS does an OR operation on received IDs then node with highest ID always wins
Zhang’s Proposal • BS polls each node for data, round robin • Node responds with data request, or a keep alive if queue is empty • BS then polls each node that responded with a data request
Disposable Token MAC Protocol (DTMP) • Improves on Zhang’s proposal • When polling nodes BS indicates if it has data to send to nodes • If no data, then remain silent • Otherwise send short message • Transmit any data to send • Channel is assumed to be reciprocal
Acampora’s Proposal • Poll, request, data phases • BS polls each node, if the node has data to sends it responds • The BS the broadcasts this nodes ID so that all nodes know the order in which to send • BS then polls nodes each node in turn for its data
Random Reservation Protocols (RRA) • Uplink is time slotted • Each slot large enough to carry one voice packet • Downlink is broadcast channel • Nodes use random access to request reservations for data to send • BS enforces a policy of reservations • Stream Reservation • Complete BS scheduling
Packet Reservation Multiple Access (PRMA) • A node with a back-logged voice packet transmits with probability p • If successful, reserves that slot for following packets • Data is similar, though no reservations are made • Different access probabilities are used for voice and data • Introduction of data packets into voice only network decreases efficiency • Improvements include limited data reservations, separating voice and data channels (FRMA), separating request and data channels (PRMA++) • Centralized PRMA uses scheduling to achieve QOS
Random Reservation Access – Independent Stations Algorithm (RRA-ISA) • BS polls a subset of all nodes • Subset is defined by the probability of a single transmission in a slot is maximized • BS uses channel history to compute subsets
Distributed-Queuing Request Update Multiple Access (DQRUMA) • Uplink and Downlink are duplexed • Uplink has request channel and packet channel • Request channel is for contention requests • Packet channel is for data (and piggyback new contention requests) • Downlink has 3 messages: ACK for current slot, transmission permission for node to use next uplink slot, and data to the nodes • Better than RAMA and PRMA
Mobile Access Scheme based on Contention and Reservation for ATM (MASCARA) • Frame consists of three periods: broadcast, reserved, and contention • Broadcast informs nodes of structure of current frame and scheduled uplink transmissions • Reserved period consists of downlink data, and uplink data as defined in broadcast period • Contention is random access and used to send new requests to BS
Dynamic Slot Assignment++ (DSA++) • MAC on uplink is TDMA • Both uplink and downlink are slotted • Each downlink slot contains some data and a MAC message • MAC message contains ACK for transmission on previous uplink slot and a reservation for next uplink slot • BS collects all requests and schedules uplink transmissions
Comparisons • QoS guarantees are not suited to Random Access protocols because delay cannot be bounded • Demand Assignment protocols are best suited to multimedia applications • Random Access lends itself to large networks • Polling protocols are efficient only for smaller networks • TDD protocols perform poorly at high data rates due to increase in switching