SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
PRESENTED BY,
M. JUNO ISABEL SUSINTHRA
 Medium Access Control (MAC) protocols is the first
protocol layer above the Physical Layer (PHY) .
 The fundamental task of any MAC protocol is to regulate
the access of a number of nodes to a shared medium in
such a way that certain application-dependent performance
requirements are satisfied.
 Requirements and design constraints for wireless MAC
protocols
 Important classes of MAC protocols
 MAC protocols for wireless sensor networks
 The most important performance requirements for MAC
protocols are throughput efficiency, stability, fairness, low
access delay, and low transmission delay, as well as a low
overhead.
 Overhead of MAC protocols:
Per packet overhead
Collision-Multiple sender wants to talk.
Collisions can happen if the MAC
protocol allows two or more nodes to send packets at the same
time.
 Hidden-terminal problem
The hidden-terminal problem occurs specifically for
the class of Carrier Sense Multiple Access (CSMA) protocols,
where a node senses the medium before starting to transmit a
packet.
 Exposed-terminal scenario
In wireless networks, when a node is prevented
from sending packets to other nodes because of a neighbouring
transmitter is known as the exposed node problem.
Mac protocols
The exposed terminal analogy is described as follows:
 B sends to A, C wants to send to another terminal D not A or B
 C senses the carrier and detects that the carrier is busy.
 C postpones its transmission until it detects the medium as
being idle again
 But A is outside radio range of C, waiting is not necessary
 C is “exposed” to B
Tip: Hidden terminals cause collisions, where as Exposed
terminals causes unnecessary delay.
 A huge number of (wireless) MAC protocols have been devised
during the last thirty years. They can be roughly classified into
the following classes.
 fixed assignment protocols
 Demand assignment protocols
 Random access protocols.
 fixed assignment protocols
-In fixed-assignment schemes, each
communicating node is assigned a frequency band in FDMA
systems or a time slot in TDMA systems.
 Demand assignment protocols
-Demand Assigned Multiple Access (DAMA) is
a protocol used in satellite communications, particularly Very
Small Aperture Terminal (VSAT) systems.
 Random access protocols
- In random access or contention methods,
no station is superior to another station and none is assigned
the control over another.
-Transmission is random among the
stations.
-That is why these methods are
called random access.
 Balance of requirements
 Energy problems on the MAC layer
 Balance of requirements
-The balance of requirements is different
from traditional (wireless) networks. Additional requirements
come up, first and foremost, the need to conserve energy.
Important requirements for MAC protocols
-scalability
-The need for scalability is evident
when considering very dense sensor networks with dozens or
hundreds of nodes in mutual range.
 Energy problems on the MAC layer
 Collisions -Multiple sender wants to talk.
 Overhearing-The wireless medium is a broadcast medium
and all the source’s neighbours that are in receive state
hear a packet and drop it when it is not destined to them;
these nodes overhear the packet.
 Protocol overhead -RTS and CTS packets or request
packets in demand assignment protocols, and furthermore
by per-packet overhead like packet headers and trailers.
 Idle listening –active listening to an redundant channel.
A node being in idle state is ready to receive a packet but
is not currently receiving anything.
THANK YOU

More Related Content

What's hot (20)

ODP
UMTS, Introduction.
Mateen Shahid
 
PDF
Issues in routing protocol
Pradeep Kumar TS
 
PDF
Diversity Techniques in Wireless Communication
Sahar Foroughi
 
PPTX
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
PPTX
TDMA, FDMA, and CDMA
Najeeb Khan
 
PPT
GSM channels
Mohd Nazir Shakeel
 
PPTX
Mobile Ad hoc Networks
Jagdeep Singh
 
PPTX
Mobility Management
Hira Shaukat
 
PPTX
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
PPTX
IEEE 802.11
Abhishek Pachisia
 
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
PPT
Adhoc wireless
Ipsita Sharma
 
PPT
Chapter 7 multiple access techniques
Kaushal Kabra
 
PPTX
M2M - Machine to Machine Technology
Samip jain
 
PPTX
Wireless Sensor Networks
juno susi
 
PPT
HiperLAN & Bluetooth.ppt
SwarnaKumariChinni
 
PDF
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
PPTX
Classification of routing protocols
Menaga Selvaraj
 
PPT
Umts system architecture
Midhun S
 
PPTX
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
UMTS, Introduction.
Mateen Shahid
 
Issues in routing protocol
Pradeep Kumar TS
 
Diversity Techniques in Wireless Communication
Sahar Foroughi
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
TDMA, FDMA, and CDMA
Najeeb Khan
 
GSM channels
Mohd Nazir Shakeel
 
Mobile Ad hoc Networks
Jagdeep Singh
 
Mobility Management
Hira Shaukat
 
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
IEEE 802.11
Abhishek Pachisia
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Adhoc wireless
Ipsita Sharma
 
Chapter 7 multiple access techniques
Kaushal Kabra
 
M2M - Machine to Machine Technology
Samip jain
 
Wireless Sensor Networks
juno susi
 
HiperLAN & Bluetooth.ppt
SwarnaKumariChinni
 
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Classification of routing protocols
Menaga Selvaraj
 
Umts system architecture
Midhun S
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 

Similar to Mac protocols (20)

PPTX
wireless sensor network
A. Shamel
 
PPT
14653128.ppt
nanisaketh
 
PPTX
Wireless sensor networks unit 3 ppt is rhere
iamurshadow759
 
PPTX
W13-L1&2.pptx
HirazNor
 
PDF
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
 
PPTX
Technical seminar
Akansha Verma
 
PPTX
Wireless sensors networks protocols
Rushin Shah
 
PPT
Mac adhoc
hinalala
 
PPT
Mac adhoc (1)
hinalala
 
PPT
mac-adhoc.ppt
syam babu
 
PPT
mac-adhoc.ppt
MahendraMunirathnam1
 
PPT
Mac adhoc
Nimii Nimo
 
PDF
Wireless Sensor Networks UNIT-3
Easy n Inspire L
 
PPTX
Week15 lec1
syedhaiderraza
 
PPTX
The concept of the engineering and applications.pptx
anusha92004
 
PPTX
Advanced Networking link layer..chap-5.pptx
amarehope21
 
PDF
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
PPT
Mac protocol for wmn
mmjalbiaty
 
PPT
MAC seminar
Mridula Sharma
 
wireless sensor network
A. Shamel
 
14653128.ppt
nanisaketh
 
Wireless sensor networks unit 3 ppt is rhere
iamurshadow759
 
W13-L1&2.pptx
HirazNor
 
CS6003 ADHOC & SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Technical seminar
Akansha Verma
 
Wireless sensors networks protocols
Rushin Shah
 
Mac adhoc
hinalala
 
Mac adhoc (1)
hinalala
 
mac-adhoc.ppt
syam babu
 
mac-adhoc.ppt
MahendraMunirathnam1
 
Mac adhoc
Nimii Nimo
 
Wireless Sensor Networks UNIT-3
Easy n Inspire L
 
Week15 lec1
syedhaiderraza
 
The concept of the engineering and applications.pptx
anusha92004
 
Advanced Networking link layer..chap-5.pptx
amarehope21
 
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
Mac protocol for wmn
mmjalbiaty
 
MAC seminar
Mridula Sharma
 
Ad

Recently uploaded (20)

PPTX
DOC-20250728-WAprocess releases large amounts of carbon dioxide (CO₂), sulfur...
samt56673
 
PPTX
原版UMiami毕业证文凭迈阿密大学学费单定制学历在线制作硕士毕业证
jicaaeb0
 
PPTX
Aryanbarot28.pptx Introduction of window os for the projects
aryanbarot004
 
PPTX
办理HFM文凭|购买代特莫尔德音乐学院毕业证文凭100%复刻安全可靠的
1cz3lou8
 
PPTX
Save significantly on desk spaces and overheads with the KVM over IP software
AvexTender
 
PPT
Susunan & Bagian DRAWING 153UWYHSGDGH.ppt
RezaFbriadi
 
PPTX
Basics of Memristors from zero to hero.pptx
onterusmail
 
PDF
Abbreviations in NC-ISM_syllabus.pdf hejsnsjs
raipureastha08
 
PPT
community diagnosis slides show health. ppt
michaelbrucebwana
 
PPTX
Modern machinery.pptx sjsjnshhsnsnnjnnbbbb
raipureastha08
 
DOCX
What Is Zoning Map Software and Why It Matters for Communities
riffatparveenseo
 
PPTX
Boolean Algebra-Properties and Theorems.pptx
bhavanavarri5458
 
PPT
3 01032017tyuiryhjrhyureyhjkfdhghfrugjhf
DharaniMani4
 
PDF
Portable Veterinary Ultrasound Scanners & Animal Medical Equipment - TcCryo
3447752272
 
PPTX
INTERNET OF THINGS (IOT) network of interconnected devices.
rp1256748
 
PPTX
Operating-Systems-A-Journey ( by information
parthbhanushali307
 
PPTX
PPT on the topic of programming language
dishasindhava
 
PPTX
PPT FOR BASIC UNDERSTANDING OF COMPUTER HARDWARE, SOFTWARE & FIRMWARE
kavishvora10
 
PPTX
Basics of Memristors and fundamentals.pptx
onterusmail
 
PDF
INTEL CPU 3RD GEN.pdf variadas de computacion
juancardozzo26
 
DOC-20250728-WAprocess releases large amounts of carbon dioxide (CO₂), sulfur...
samt56673
 
原版UMiami毕业证文凭迈阿密大学学费单定制学历在线制作硕士毕业证
jicaaeb0
 
Aryanbarot28.pptx Introduction of window os for the projects
aryanbarot004
 
办理HFM文凭|购买代特莫尔德音乐学院毕业证文凭100%复刻安全可靠的
1cz3lou8
 
Save significantly on desk spaces and overheads with the KVM over IP software
AvexTender
 
Susunan & Bagian DRAWING 153UWYHSGDGH.ppt
RezaFbriadi
 
Basics of Memristors from zero to hero.pptx
onterusmail
 
Abbreviations in NC-ISM_syllabus.pdf hejsnsjs
raipureastha08
 
community diagnosis slides show health. ppt
michaelbrucebwana
 
Modern machinery.pptx sjsjnshhsnsnnjnnbbbb
raipureastha08
 
What Is Zoning Map Software and Why It Matters for Communities
riffatparveenseo
 
Boolean Algebra-Properties and Theorems.pptx
bhavanavarri5458
 
3 01032017tyuiryhjrhyureyhjkfdhghfrugjhf
DharaniMani4
 
Portable Veterinary Ultrasound Scanners & Animal Medical Equipment - TcCryo
3447752272
 
INTERNET OF THINGS (IOT) network of interconnected devices.
rp1256748
 
Operating-Systems-A-Journey ( by information
parthbhanushali307
 
PPT on the topic of programming language
dishasindhava
 
PPT FOR BASIC UNDERSTANDING OF COMPUTER HARDWARE, SOFTWARE & FIRMWARE
kavishvora10
 
Basics of Memristors and fundamentals.pptx
onterusmail
 
INTEL CPU 3RD GEN.pdf variadas de computacion
juancardozzo26
 
Ad

Mac protocols

  • 1. PRESENTED BY, M. JUNO ISABEL SUSINTHRA
  • 2.  Medium Access Control (MAC) protocols is the first protocol layer above the Physical Layer (PHY) .  The fundamental task of any MAC protocol is to regulate the access of a number of nodes to a shared medium in such a way that certain application-dependent performance requirements are satisfied.
  • 3.  Requirements and design constraints for wireless MAC protocols  Important classes of MAC protocols  MAC protocols for wireless sensor networks
  • 4.  The most important performance requirements for MAC protocols are throughput efficiency, stability, fairness, low access delay, and low transmission delay, as well as a low overhead.  Overhead of MAC protocols: Per packet overhead Collision-Multiple sender wants to talk. Collisions can happen if the MAC protocol allows two or more nodes to send packets at the same time.
  • 5.  Hidden-terminal problem The hidden-terminal problem occurs specifically for the class of Carrier Sense Multiple Access (CSMA) protocols, where a node senses the medium before starting to transmit a packet.  Exposed-terminal scenario In wireless networks, when a node is prevented from sending packets to other nodes because of a neighbouring transmitter is known as the exposed node problem.
  • 7. The exposed terminal analogy is described as follows:  B sends to A, C wants to send to another terminal D not A or B  C senses the carrier and detects that the carrier is busy.  C postpones its transmission until it detects the medium as being idle again  But A is outside radio range of C, waiting is not necessary  C is “exposed” to B Tip: Hidden terminals cause collisions, where as Exposed terminals causes unnecessary delay.
  • 8.  A huge number of (wireless) MAC protocols have been devised during the last thirty years. They can be roughly classified into the following classes.  fixed assignment protocols  Demand assignment protocols  Random access protocols.
  • 9.  fixed assignment protocols -In fixed-assignment schemes, each communicating node is assigned a frequency band in FDMA systems or a time slot in TDMA systems.  Demand assignment protocols -Demand Assigned Multiple Access (DAMA) is a protocol used in satellite communications, particularly Very Small Aperture Terminal (VSAT) systems.
  • 10.  Random access protocols - In random access or contention methods, no station is superior to another station and none is assigned the control over another. -Transmission is random among the stations. -That is why these methods are called random access.
  • 11.  Balance of requirements  Energy problems on the MAC layer
  • 12.  Balance of requirements -The balance of requirements is different from traditional (wireless) networks. Additional requirements come up, first and foremost, the need to conserve energy. Important requirements for MAC protocols -scalability -The need for scalability is evident when considering very dense sensor networks with dozens or hundreds of nodes in mutual range.
  • 13.  Energy problems on the MAC layer  Collisions -Multiple sender wants to talk.  Overhearing-The wireless medium is a broadcast medium and all the source’s neighbours that are in receive state hear a packet and drop it when it is not destined to them; these nodes overhear the packet.  Protocol overhead -RTS and CTS packets or request packets in demand assignment protocols, and furthermore by per-packet overhead like packet headers and trailers.  Idle listening –active listening to an redundant channel. A node being in idle state is ready to receive a packet but is not currently receiving anything.