Chapter 2 Mac Protocols
Chapter 2 Mac Protocols
2.1 MAC Protocols for Ad hoc wireless Networks: Introduction, Issues in designing a MAC
protocol for Ad hoc wireless Networks, Design goals and Classification of a MAC protocol,
Contention based protocols with reservation mechanisms.
2.2 Scheduling algorithms, protocols using directional antennas. IEEE standards: 802.11a,
802.11b, 802.11g, 802.15, 802.16, HIPERLAN.
1) Contention-based protocols
• Receiver-initiated protocols: The receiver node initiates the contention resolution protocol.
• Asynchronous protocols: These protocols use relative time information for effecting
Reservations.
Other protocols are those MAC protocols that do not strictly fall under the above categories . Directional
antenna based protocols fall within this category.
MACA Protocol
MACA does not make use of carrier-sensing for channel access. It uses two additional signaling
packets: the request-to-send (RTS) packet and the clear-to-send (CTS) packet.
When a node wants to transmit a data packet, it first transmits an RTS packet. The receiver node, on
receiving the RTS packet, if it is ready to receive the data packet, transmits a CTS packet.
Once the sender receives the CTS packet without any error, it starts transmitting the data packet.
If a packet transmitted by a node is lost, the node uses the binary exponential back-off (BEB)
algorithm to back off for a random interval of time before retrying.
A node near the receiver, upon hearing the CTS packet, defers its transmission till the receiver
receives the data packet. Thus, MACA overcomes the hidden node problem.
Similarly, a node receiving an RTS defers only for a short period of time till the sender
could receive the CTS. Thus, a node that hears only the RTS packet is free to transmit
simultaneously when the sender of the RTS is transmitting data packets. Hence, the exposed terminal
problem is also overcome in MACA.
MACAW Protocol
To prevent large variations in the back-off values, a multiplicative increase and linear decrease
(MILD) back-off mechanism is used in MACAW. Here, upon a collision, the back-off is increased
by a multiplicative factor (1.5), and upon a successful transmission, it is decremented by one.
In MACAW, after successful reception of each data packet, the receiver node transmits an ACK
packet. If the sender does not receive the ACK packet, it reschedules the same data packet for
transmission.
MACAW uses another small (30-bytes) control packet called the data-sending (DS) packet. Before
transmitting the actual data packet, the source node transmits this DS packet. The DS packet carries
information such as the duration of the data packet transmission, which could be used by the exposed
nodes for updating information they hold regarding the duration of the data packet transmission.
The MACAW protocol uses one more control packet called the request-for-request-to-send (RRTS)
packet.
MACAW protocol has been designed based on four main observations.
The first is that the relevant congestion occurs at the receiver node and not at the sender. This
realization makes CSMA protocols unsuitable for ad hoc wireless networks, and therefore the RTS-
CTS-DATA exchange mechanism of MACA becomes necessary.
MACAW further improves upon this scheme using the RTS-CTS-DS-DATA-ACK exchange
mechanism.
Multichannel Protocols
1) Busy Tone Multiple Access Protocols
1.1 Busy Tone Multiple Access
The busy tone multiple access (BTMA) protocol [4] is one of the earliest protocols proposed for
overcoming the hidden terminal problem faced in wireless environments.
The transmission channel is split into two: a data channel and a control channel.
The data channel is used for data packet transmissions, while the control channel is used to transmit
the busy tone signal.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
______________________________________________________________________________________
When a node is ready for transmission, it senses the channel to check whether the busy tone is
active. If not, it turns on the busy tone signal and starts data transmission; otherwise, it reschedules
the packet for transmission after some random rescheduling delay.
Any other node which senses the carrier on the incoming data channel also transmits the busy tone
signal on the control channel. Thus, when a node is transmitting, no other node in the two-hop
neighborhood of the transmitting node is permitted to simultaneously transmit.
Though the probability of collisions is very low in BTMA, the bandwidth utilization is very poor
Transmission in BTMA
In the receiver-initiated busy tone multiple access protocol (RI-BTMA) ,similar to BTMA, the
available bandwidth is divided into two channels: a data channel for transmitting data packets and a
control channel.
The control channel is used by a node to transmit the busy tone signal. A node can transmit on the
data channel only if it finds the busy tone to be absent on the control channel.
The data packet is divided into two portions: a preamble and the actual data packet.
The Preamble carries the identification of the intended destination node. Both the data channel and
the control channel are slotted, with each slot equal to the length of the preamble.
Data transmission consists of two steps. First, the preamble needs to be transmitted by the sender.
Once the receiver node acknowledges the reception of this preamble by transmitting the busy tone
signal on the control channel, the actual data packet is transmitted.
A sender node that needs to transmit a data packet first waits for a free slot, that is, a slot in which
the busy tone signal is absent on the control channel.
Once it finds such a slot, it transmits the preamble packet on the data channel. If the destination
node receives this preamble packet correctly without any error, it transmits the busy tone on the
control channel till it is receiving data from the sender.
Basic protocol,
Nodes do not have backlog buffers to store data packets. Hence packets that suffer collisions cannot
be retransmitted.
Also, when the network load increases, packets cannot be queued at the nodes.
This protocol would work only when the network load is not high; when network load starts
increasing, the protocol becomes unstable.
If it is ready to transmit, the sender node respond by sending a DATA packet
Thus data transmission in MACA-BI occurs through a two-way handshake mechanism
The efficiency of the MACA-BI scheme is mainly dependent on the ability of the receiver node to predict
accurately the arrival rates of traffic at the sender nodes.
In MACA, the CTS packet was used to inform the hidden terminals (nodes) about the impending
DATA packet transmission, so that they do not transmit at the same time and disrupt the session.
This role is played in MACA-BI by the RTR packets. An RTR packet carries information about the
time interval during which the DATA packet would be transmitted.
Since it has information about transmissions by the hidden terminals, it refrains from transmitting
during those periods. Hence the Collision among DATA packets is impossible, but among control
packets is possible as shown in following diagram.
It can be observed from the figure that the time taken for a packet transmitted by node A to reach
node D in MARCH, that is, tMARCH, is less compared to the time taken in MACA, tMACA.
The throughput of MARCH is significantly high compared to MACA
Control overhead is much less and Less BW is consumed for control traffic.
When the network is heavily loaded, the average end-to-end delay in packet delivery for MARCH is
very low compared to that of MACA.
All the above advantages are mainly due to the fact that MARCH has a lower number of control
packet handshakes compared to MACA.
The lower number of control packets transmitted reduces the control overhead while improving the
throughput, since less bandwidth is being consumed for control traffic.
Merging of subnets.
When a new node enters the network, it remains on the synchronizing frequency f 0 for a long enough
period of time so as to gather synchronization information such as the hopping pattern and the timing
of the system
If it receives no information, it assumes that it is the only node in the network, broadcasts its own
synchronization information and forms a one-node system
Figure above depicts the worst-case frequency overlap scenario
When a node receives data to be transmitted, it first listens to the HR period of the immediately
following slot
If it finds the channel to be free during the SR period, it transmits an RTS packet to the destination
during the RTS period of the slot and waits for the CTS packet
On receiving the RTS, the destination node transmits the CTS packet during the CTS period of the same
slot and waits for the data packet
If the source node receives the CTS packet correctly, it implies that the source and receiver nodes have
successfully reserved the current hop
After transmitting each data packet, the source node hops onto this acknowledgement frequency.
The receiver sends an ACK packet back to the source.
o Reservation request phase: Nodes that need to transmit packets send reservation request (RR)
packets to their destination nodes.
o Collision report phase: If a collision is detected by any node during the reservation request phase, then
that node broadcasts a collision report (CR) packet. The corresponding source nodes, upon receiving the
CR packet, take necessary action. By listening for CR packets in this phase, an RN comes to know
about collision of the RR packet it had sent. If no CR is heard by the RN in this phase, it then
becomes a transmitting node (TN). Once it becomes a transmitting node, the node proceeds to the
next phase, the reservation confirmation phase. On the other hand, if it hears a CR packet in this
phase, it waits until the next reservation request phase, and then tries again.
o Reservation confirmation phase: A source node is said to have won the contention for a slot if it
does not receive any CR messages in the previous phase. In order to confirm the reservation
request made in the reservation request phase, it sends a reservation confirmation (RC) message
to the destination node in this phase.
o Reservation acknowledgment phase: In this phase, the destination node acknowledges reception
of the RC by sending back a reservation acknowledgment (RA) message to the source. The
hidden nodes that receive this message defer their transmissions during the reserved slot.
Here nodes 1, 7, and 9 have packets ready to be transmitted to nodes 4, 8, and 10, respectively.
During the reservation request phase, all three nodes transmit RR packets.
Since no other node in the two-hop neighborhood of node 1 transmits simultaneously, node 1
does not receive any CR message in the collision report phase.
So node 1 transmits an RC message in the next phase, for which node 4 sends back an RA message,
and the reservation is established.
But at the node 11 CR is observed hence RC and RA cannot takes place.
A separate set of control packets, consisting of ResvRTS, ResvCTS, and ResvACK, is used for
effecting BW reservation for real-time packets
RTS, CTS and ACK control packets are used for transmitting best effort packets.
Time is divided into super frames. (figure)
Bandwidth reservations can be made by a node by reserving variable-length time slots on
super frames
The core concept of RTMAC is the flexibility of slot placement in the super frame
Each super frame consists of a number of reservation-slots
The time duration of each resv-slot is twice the maximum propagation delay
Data transmission normally requires a block of resv-slots
A node that needs to transmit real-time packets first reserves a set of resv-slots
The set of resv-slots reserved by a node for a connection on a super frame is called a
connection-slot
Each node maintains a reservation table containing information such as the sender id,
receiver id, and starting and ending times of reservations that are currently active
In RTMAC, no time synchronization is assumed
The protocol uses relative time for all reservation purpose
A three way handshake protocol is used for effecting the reservation
In the figure, NAV indicates the network allocation vector maintained at each node
Advantages
Main advantage is Bandwidth efficiency
Another advantage is asynchronous mode of operation where nodes do not require any global
time synchronization
Each node is assumed to have only one radio transceiver, which can transmit and receive
only one packet at any given time. The transceiver is assumed to be equipped with M
directional antennas, each antenna having a conical radiation pattern, spanning an angle
of radians.
Packet Transmission
Each node is assumed to have six directional antennas. The main concept in this protocol
is the mechanism used by the transmitting and receiving nodes to determine the
directions of each other.
An idle node is assumed to be listening to the on-going transmissions on all its antennas.
The sender node first transmits an RTS packet addressed to the receiver. This RTS is
transmitted through all the antennas of the node (omnidirectional transmission).
The intended receiver node, on receiving this RTS packet, responds by transmitting a
CTS packet, again on all its antennas (omnidirectional transmission).
The receiver node also notes down the direction of the sender by identifying the antenna
that received the RTS packet with maximum power.
The source, on receiving the CTS packet, determines the direction of the receiver node in
a similar manner.
The neighbor nodes that receive the RTS or CTS packets defer their transmissions for
appropriate periods of time.
After receiving the CTS, the source node transmits the next data packet through the
chosen directional antenna. All other antennas are switched off and remain idle.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
The receiver node receives this data packet only through its selected antenna.
The directional busy tone-based MAC protocol [22] adapts the DBTMA protocol [5] for use
with directional antennas. It uses directional antennas for transmitting the RTS, CTS, and data
frames, as well as the busy tones. By doing so, collisions are reduced significantly. Also, spatial
reuse of the channel improves, thereby increasing the capacity of the channel.
The protocol uses the same two busy tones BTt and BTr used in the DBTMA protocol. The
purpose of the busy tones is the same.
Before transmitting an RTS packet, the sender makes sure that the BTr tone is not active
in its neighborhood, similarly, a receiver node, before transmitting a CTS, verifies that a
BTt is not active in its neighborhood. This is done to make sure that the data the node is
expected to receive does not collide with any other on-going.
The directional busy tones can permit simultaneous transmissions in the neighborhood of
a transmitting or a receiving node.
When Omni directional busy tones are being used, when a transmission is going on from
node A to node B, node D is not permitted to receive any data as it hears the BTt tone
transmitted by node A. But when directional busy tone transmissions are used, it can be
seen that node D can simultaneously receive data from node C.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
2) Directional MAC Protocols for Ad Hoc Wireless Networks
DMAC-1
In the first directional MAC scheme (DMAC-1), a directional antenna is used for
Transmitting RTS packets. CTS packet transmissions are Omni directional.
Here node A, which needs to transmit a packet to node B, first transmits a directional
RTS (DRTS) packet to node B. Node B, on receiving this packet, responds by
transmitting an Omni directional CTS (OCTS) packet.
Once the OCTS is received without any error by node A, node A sends a data packet
using a directional antenna. When node B receives the data packet, it immediately
transmits a directional ACK (DACK) packet.
Node C would receive the OCTS packet from node B. At node C, only the directional
antenna pointing toward node B would be blocked due to this. Node C can freely transmit
to node D using another directional antenna. Thus it can be seen that in DMAC-1, usage
of directional antennas improves the performance by allowing simultaneous
transmissions.
DMAC-2
In the second directional MAC scheme (DMAC-2) proposed in ,both directional RTS
(DRTS) as well as Omni directional RTS (ORTS) transmissions are used.
The probability of control packet collisions is reduced in DMAC-2. In DMAC-2, a node
that wants to initiate a data transfer may send an ORTS or aDRTS as per the following
two rules.
o If none of the directional antennas at the node are blocked, then the node sends an
ORTS packet.
o Otherwise, the node sends a DRTS packet, provided the desired directional
antenna is not blocked.
Protocols that fall under this category focus on packet scheduling at the nodes and
transmission scheduling of the nodes. Scheduling decisions may take into consideration various
factors such as delay targets of packets, laxities of packets, traffic load at nodes, and remaining
battery power at nodes.
Two mechanisms for providing quality of service (QoS) support for connections in ad hoc
wireless networks.
Distributed priority scheduling (DPS), piggy-backs the priority tag of a node's current and
head-of-line packets on the control and data packets.
Multi-Hop Coordination
By means of the multi-hop coordination mechanism, the excess delay incurred by a
packet at the upstream nodes is compensated for at the downstream nodes.
When a node receives a packet, it would have already received the priority index of the
packet piggy-backed on the previous RTS packet. In case the node is an intermediate
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
node which has to further forward the packet, the node calculates the new priority index
of the DATA packet in a recursive fashion, based on the received value of the priority
index
If = the priority index assigned to the Kth packet of flow i with size at its jth hop,
and = the time at which the Kth packet of flow i arrives at its first hop (the next hop
node to the source node on the path to the destination), Then
New priority index assigned to the received packet at intermediate node j is given as
Because of this mechanism, if a packet suffers due to excess delay at the upstream nodes,
the downstream nodes increase the priority of the packet so that the packet is able to meet
its end-to-end delay target.
Similarly, if a packet arrives very early due to lack of contention at the upstream nodes,
then the priority of that packet would be reduced at the downstream nodes.
Here sender of flow A is not aware of the arrival times of packets queued at the sender of
flow B and hence it concludes that it has the highest priority packet in its neighborhood.
Therefore, node 1 unsuccessfully tries to gain access to the channel continuously. This
would result in flow B receiving an unfair higher share of the available bandwidth.
In the receiver participation mechanism, a receiver node, when using its ST information,
finds that the sender is transmitting out of order, that is, the reference FIFO schedule is
being violated, an out-of-order notification is piggy-backed by the receiver on the control
packets (CTS/ACK) it sends to the sender.
Thus the node backs off after the transmission of its current packet, allowing higher
priority packets in the neighborhood of the receiver to get transmitted first.
The stale entry elimination mechanism makes sure that the STs are free of stale entries.
An entry is deleted from the ST only after an ACK packet for the corresponding entry is
heard by the node. In case the ACK packet collides at the node, the corresponding entry
in the ST will never be removed.
The sender and receiver of flow B might have stale entries because of collisions caused
by packets belonging to flow A and flow C at the sender and receiver of flow B.
Thus, when a node observes that its rank remains fixed while packets whose priorities are
below the priority of its head-of-line packet are being transmitted; it concludes that it may
have one or more stale entries in its ST. The node simply deletes the oldest entry from its
ST, assuming it to be the stale entry.
This mechanism thus eliminates stale entries from the STs of nodes.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
o Packet delivery ratio table (PDT). Count of packets transmitted and the count
of acknowledgment (ACK) packets received for every flow passing through the
node.
A node keeps track of packet delivery ratios (used for calculating priority index of
packets) of all flows it is aware of by means of a feedback mechanism.
Feedback Mechanism
Incoming packets to a node are queued in the node's input queue according to their arrival
times. The scheduler sorts them according to their priority values and inserts them into
the transmission queue.
The node, after transmitting a packet, updates the count of packets transmitted so far in
its PDT. The destination node of a flow, on receiving data packets, initiates a feedback by
means of which the count of DATA packets received by it is conveyed to the source
through ACK packets traversing the reverse path.
The lower the priority index, the higher the packets priority and the highest priority
packet from this queue is selected for transmission.
The Priority Index is calculated using ULB (uniform laxity budgets). The ULB of each
packet in ST is available at the node.
Using the count of DATA packets transmitted (pktsSent) and count information carried
by ACK packets (acksRcvd), available in PDT, packet delivery ratio (PDR) of the flow at
any given time is computed as
Here,
Is the uniform laxity budget of the packet, and
M = user defined parameter representing the desired packet delivery ratio of flow.
Deadline = the end-to-end deadline target of the packet and is equal to
(Packet creation time + end-to-end delay target).
Current Time = the current time according to the node's local clock.
When greater numbers of packets belonging to a flow meet their delay targets, the term
would have a high value. Hence priority index would be high for packets of that
flow, and therefore the actual priority of the packets would be low.
When very few packets of a flow meet their delay targets, the value of would be
much less, thereby lowering the priority index and increasing the priority of packets of
that flow. ULB also plays an equally important role.
Since remHops, the number of hops remaining to be traversed, is in the denominator of
the expression for ULB, when a packet is near its source and needs to traverse several
hops to reach its destination, its priority index value will be lowered, thereby increasing
its priority. When it nears its destination, the fewer number of hops to be traversed tends
to increase the priority index, thereby lowering its priority.
IEEE STANDARDS
Fundamentals of WLAN
2.2.1 Technical Issues
Here the technical issues that are encountered in the design and engineering of WLANs are
discussed. They can act as differences between wireless and wired networks
• Address is not equivalent to physical location:
• Dynamic topology and restricted connectivity:
• Medium boundaries are not well-defined
• Error-prone medium:
Use of WLANs
WLANs are very flexible and can be configured in a variety of topologies based on the
application. Some possible uses of WLANs are mentioned below.
• Users would be able to surf the Internet, check e-mail, and receive Instant Messages on the
move.
• In areas affected by earthquakes or other such disasters, no suitable infrastructure may be
available on the site. WLANs are handy in such locations to set up networks on the fly.
Design Goals
The following are some of the goals which have to be achieved while designing
WLANs:
• Operational simplicity:.
• Power-efficient operation:
• License-free operation:
• Tolerance to interference:
• Global usability:
• Security:
• Safety requirements:
• Quality of service requirements:
• Compatibility with other technologies and applications:
IEEE 802.11
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for
implementing wireless local area network (WLAN) computer communication in the 900 MHz and 2.4,
3.6, 5, and 60 GHz frequency bands. They are created and maintained by the Institute of Electrical and
Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). The base version of the
standard was released in 1997, and has had subsequent amendments. The standard and amendments
provide the basis for wireless network products using the Wi-Fi brand.
Network Architecture
This section lists the types of WLANs, the components of a typical WLAN, and the services offered by a
WLAN.
Infrastructure Based Versus Ad Hoc LANs
Physical Layer
IEEE 802.11 supports three options for the medium to be used at the physical level — one is
based on infrared and the other two are based on radio transmission. (FSHH and DSSS)
• 802.11: This was the first 802.11 task group. The objective of this group was to develop MAC
layer and physical layer specifications for wireless connectivity for fixed, portable, and mobile
nodes within a local area. The 802.11 standard was first published in 1997.
• 802.11a: This group created a standard for wireless LAN operations in the 5 GHz frequency
band, where data rates of up to 54 Mbps are possible. The 802.11a standard was ratified in 1999.
– System: orthogonal frequency division multiplexing (OFDM).
– Data payload communication capability: 6, 9, 12, 18, 24, 36, 48, and 54 Mbps
• 802.11b: This task group created a standard for wireless LAN operations in the 2.4 GHz
Industrial, Scientific, and Medical (ISM) band, which is freely available for use throughout the
world. This standard is popularly referred to as Wi-Fi, standing for Wireless-Fidelity. It can offer
data rates of up to 11 Mbps. This standard was ratified in 1999.
• 802.11g: This group was involved in extending the 802.11b standard to support high-speed
transmissions of up to 54 Mbps in the 5 GHz frequency band, while maintaining backward
compatibility with current 802.11b devices. The 802.11g standard was published in 2003.
• 802.11n: The objective of this group is to define standardized modifications to the 802.11
MAC and physical layers such that modes of operation that are capable of much higher
throughputs at the MAC layer, with a maximum of at least 100 Mbps, can be enabled. Work on
this is in progress.
Task group one is based on Bluetooth technology. It defines physical layer (PHY) and Media Access
Control (MAC) specification for wireless connectivity with fixed, portable and moving devices within or
entering personal operating space. Standards were issued in 2002 and 2005.[1][2]
Task group two addresses the coexistence of wireless personal area networks (WPAN) with other
wireless devices operating in unlicensed frequency bands such as wireless local area networks (WLAN).
The IEEE 802.15.2-2003 standard was published in 2003[3] and task group two went into "hibernation".[4]
IEEE 802.15.3-2003
IEEE 802.15.3-2003 is a MAC and PHY standard for high-rate (11 to 55 Mbit/s) WPANs.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
IEEE P802.15.3a
IEEE 802.15.3a was an attempt to provide a higher speed Ultra wideband PHY enhancement amendment
to IEEE 802.15.3 for applications which involve imaging and multimedia
IEEE 802.15.3b-2006
IEEE 802.15.3b-2005 amendment was released on May 5, 2006. It enhanced 802.15.3 to improve
implementation and interoperability of the MAC. This amendment include many optimizations, corrected
errors, clarified ambiguities, and added editorial clarifications while preserving backward compatibility.
IEEE 802.15.3c-2009
IEEE 802.15.3c-2009 was published on September 11, 2009. The task group TG3c developed a
millimeter-wave-based alternative physical layer (PHY) for the existing 802.15.3 Wireless Personal Area
Network (WPAN) Standard 802.15.3-2003ee PHY modes were defined in the standard:[8]
IEEE 802.15.4-2003 (Low Rate WPAN) deals with low data rate but very long battery life (months or
even years) and very low complexity, including IEEE 802.15.5, ZigBee, 6LoWPAN, WirelessHART, and
ISA100.11a.
The principal interest was in providing higher precision ranging and location capability (1 meter accuracy
and better), higher aggregate throughput, adding scalability to data rates, longer range, and lower power
consumption and cost.
IEEE 802.15.4b was approved in June 2006 and was published in September 2006 as IEEE 802.15.4-
2006. The IEEE 802.15 task group 4b was chartered to create a project for specific enhancements and
clarifications to the IEEE 802.15.4-2003 standard, such as resolving ambiguities, reducing unnecessary
complexity, increasing flexibility in security key usage, considerations for newly available frequency
allocations, and others.
1. BLUETOOTH:
The first attempt to define a standard for PANs dates back to Ericsson's Bluetoothproject2 in
1994 to enable communication between mobile phones using low power and low-cost radio
interfaces. In May 1998, several companies such as Intel, IBM, Nokia, and Toshiba joined
Ericsson to form the Bluetooth Special Interest Group (SIG) whose aim was to develop a de
facto standard for PANs
Low power consumption of Bluetooth technology and an offered range of up to ten meters
has paved the way for several usage models. One can have an interactive conference by
establishing an ad hoc network of laptops. Cordless computer, instant postcard [sending digital
photographs instantly (a camera is cordlessly connected to a mobile phone)], and three-in-one
phone [the same phone functions as an intercom (at the office, no telephone charge), cordless
phone (at home, a fixed-line charge), and mobile phone (on the move, a cellular
charge)] are other indicative usage models.
Piconet
The initiator for the formation of the network assumes the role of the master (of the
piconet). All the other members are termed as slaves of the piconet. A piconet can have up to
seven active slaves at any instant. For the purpose of identification, each active slave of the
piconet is assigned a locally unique active member address AM_ADDR. Other devices could
also be part of the piconet by being in the parked mode. A Bluetooth device not associated
with any piconet is said to be in standby mode. Figure shows a piconet with several devices.
Scatternet
a device can participate in two or more overlaying piconets by the process of time sharing. To
participate on the proper channel, it should use the associated master device address and proper
clock offset. A Bluetooth unit can act as a slave in several piconets, but as a master in only a
single piconet. A group of piconets in which connections exist between different piconets is
called ascatternet
2. HOMERF
Wireless home networking represents the use of the radio frequency (RF) spectrum to
transmit voice and data in confined areas such as homes and small offices. One of the visionary
concepts that home networking intends to achieve is the establishment of communication
between home appliances such as computers, TVs, telephones, refrigerators, and air conditioners.
Home RF Working Group has developed a technology that is termed HomeRF. This
technology intends to integrate devices used in homes into a single network and utilize RF links
for communication. HomeRF is a strong competitor to Bluetooth as it operates in the ISM band.
Technical Features
The HomeRF provides data rates of 1.6 Mbps, a little higher than the Bluetooth
rate, supporting both infrastructure-based and ad hoc communications.
It provides a guaranteed QoS delivery to voice-only devices and best-effort
delivery for data-only devices.
A typical HomeRF network consists of resource providers (through which
communication to various resources such as the cable modem and phone lines is
effected), and the devices connected to them (such as the cordless phone, printers, and
file servers).
The HomeRF technology follows a protocol called the shared wireless access protocol
(SWAP).
Because of its complex (hybrid) MAC and higher capability physical layer, the cost of HomeRF
devices is higher than that of Bluetooth devices. HomeRF Version 2.0, released recently, offers
higher data rates (up to 10 Mbps by using wider channels in the ISM band through FHSS).
3. Infrared
The infrared technology (IrDA) uses the infrared region of the light for communication. Some of
the characteristics of these communications are as follows:
• The infrared rays can be blocked by obstacles, such as walls and buildings.
• The effective range of infrared communications is about one meter. But when
high power is used, it is possible to achieve better ranges.
• The power consumed by infrared devices is extremely low.
• Data rates of 4 Mbps are easily achievable using infrared communications.
• The cost of infrared devices is very low compared to that of Bluetooth devices.
Although the restriction of line of sight (LoS) is there on the infrared devices, they are
extremely popular because they are cheap and consume less power.
The acronym WiMAX stands for “Worldwide Interoperability for Microwave Access”. It is
based on IEEE 802.16 standard.
IEEE 802.16 is the IEEE standard for Wireless Metropolitan Area Network (Wireless MAN).
It specifies the air interface for fixed, portable, and mobile broadband wireless access (BWA)
systems supporting multimedia services.
WiMAX aims to provide wireless broadband services with a target range of up to 31 miles at a
transmission rate exceeding 100 Mbps.
____________Prepared By: Mrs. KRANTI M. GAJMAL (Asst. Prof. Computer Dept.)__________
Gharda Institute of Technology, Ratnagiri (Khed,Lavel)
Sub: Adhoc Wireless Network (BE COMPUTER-VIII Semester)
_____________________________________________________________________________________
_
It is also to provide a wireless alternative to cable, DSL and T1/E1 for last mile access.
The term IEEE 802.16 and WIMAX are used interchangeably.
WiMAX is to IEEE 802.16 what Wi-Fi is to IEEE 802.11
Overview of the IEEE 802.16 Standard
Designed for point-to-point (PTP) and point-to-multipoint (PTM) topologies but mainly
deployed for point to multipoint topologies. It also support mesh topologies.
In PTM a base station (BS) services many subscriber stations (SS) which are mounted outdoors.
IEEE 802.16 has three major versions; 802.16-2001, 802.16-2004 and IEEE 802.16-2005.
IEEE 802.16-2001
Addresses fixed line of sight connections and operates in the licensed frequency range between
10 GHz and 66 GHz.
At this high frequency range there are more available bandwidth and reduced risk of
interference.
Has a maximum coverage of 5km.
IEEE 802.16-2005(802.16e)
Support mobility and will standardize networking between fixed base stations and mobile
devices.
Would enable high-speed signal handoffs necessary for communications with users moving at
vehicular speeds which are below 100km/h.
It will provide a symmetric (up and down) bit rates of 70Mbps.
Operate in the frequency range between 2-6 GHz.
Applications
To provide a wireless alternative to cable, DSL and T1/E1 for last mile access especially in areas
where wire broadband access are absent.
Serves as E1/T1 replacements for small and medium size businesses.
Provide residential ‘wireless DSL’ for broadband Internet at home.
It can be used as wireless backhaul for Wi-Fi hotspot and cellular companies.
Operators/carriers can use it as a backup backbone.
It can be used in disaster recovery scenes where the wired networks have broken down.
Sr.
Wi-MAX Wi-Fi
No
WiMAX was designed to replace the
Wi-Fi was created for providing services into
1) last-mile wired-broadband access
LAN networks.
networks
At the PHY layer, WiMAX channel Wi-Fi based products require at least 20 MHz
2)
sizes ranges from 1.75 MHz to 20 MHz for each channel
The MAC layer in WiMAX has been Wi-Fi uses the CSMA/CA (Carrier Sense
3) designed to scale from one to up 100s Multiple Access with Collision Avoidance)
users within one RF channel. which is not an efficient protocol.
In WiMAX, the base station assigns a In 802.11, QoS was not considered in the early
4)
QoS class to each connection. stage of its implementation.
WiMAX supports many transport
5) technologies, such as ATM, IPv4, and These technologies are not supported by Wi-Fi
IPv6
WiMAX has the ability to support 802.11 was designed for low power
6) longer range transmission from 2 to 40 consumption which limit the coverage to
kilometers. hundreds of meters.
HiperLAN
Four standards have been defined for wireless networks by the ETSI.
• HIPERLAN/1 is a wireless radio LAN (RLAN) without a wired infrastructure, based on one-
to-one and one-to-many broadcasts. It can be used as an extension to a wired infrastructure, thus
making it suited to both ad hoc and infrastructure based networks. It employs the 5.15 GHz and
the 17.1 GHz frequency bands and provides a maximum data rate of 23.5 Mbps.
• The HIPERLAN/2 standard intends to provide short-range (up to 200 m) wireless access to
Internet protocol (IP), asynchronous transfer mode (ATM1), and other infrastructure-based
networks and, more importantly, to integrate WLANs into cellular systems. It employs the 5
GHz frequency band and offers a wide range of data rates from 6 Mbps to 54 Mbps.
HIPERLAN/2 has been designed to meet the requirements of future wireless multimedia
services.
• HIPERACCESS (originally called HIPERLAN/3) covers "the last mile" to the customer; it
enables establishment of outdoor high-speed radio access networks, providing fixed radio
connections to customer premises. HIPERACCESS provides a data rate of 25 Mbps. It can be
used to connect HIPERLAN/2 deployments that are located far apart (up to 5 Km away). It
offers point-to-multipoint communication.
• The HIPERLINK (originally called HIPERLAN/4) standard provides high speed radio links
for point-to-point static interconnections. This is used to connect different HIPERLAN access
points or HIPERACCESS networks with high-speed links over short distances of up to 150 m.
HIPERLINK operates on the 17 GHz frequency range.
1. HIPERLAN/1
Apart from supporting node mobility, HIPERLAN/1 provides forwarding mechanisms
(multi-hop routing).
HIPERLAN/1 provides a data rate of around 23.5 Mbps without utilizing much power,
thus having the capability to support multimedia data and asynchronous data effectively.
This data rate is significantly higher than that provided by IEEE 802.11.
The HIPERLAN/1 protocol stack is restricted to the two lower-most layers in the OSI
reference model: the data link layer (DLL) and the physical layer. The DLL is further
divided into the medium access control (MAC) sub layer and the channel access control
(CAC) sub layer.
The HIPERLAN/1 standard has suggested power conservation schemes at both the MAC
and the physical layers. At the MAC level, the standard suggests awake/sleep modes
similar to the DFWMAC in IEEE 802.11.
At the physical level, a framing scheme has been adopted to conserve power. The
physical burst is divided into high bit rate (HBR) and low bit rate (LBR) bursts. The
difference between the two bursts lies in the keying mechanisms.
5) Failure of HIPERLAN/1
In spite of the high data rate that it promised, HIPERLAN/1 standard has always been
considered unsuccessful. This is because IEEE Ethernet had been prevalent and hence,
for its wireless counterpart too, everybody turned toward IEEE, which came out with its
IEEE 802.11 standard.
As a result, hardly any manufacturer adopted the HIPERLAN/1 standard for product
development.
2. HIPERLAN/2
The HIPERLAN/2 tries to integrate WLANs into the next-generation cellular systems. It
aims at converging IP and ATM type services at a high data rate of 54 Mbps for indoor
and outdoor applications. The HIPERLAN/2, an ATM compatible WLAN, is a
connection-oriented system, which uses fixed size packets and enables QoS applications
easy to implement.
There are two modes of communication in a HIPERLAN/2 network, which are described by the
following two environments:
• Business environment: The ad hoc architecture of HIPERLAN/1 has been extended to support
a centralized mode of communication using APs. This topology corresponds to business
environments. Accordingly, each AP serves a number of MTs.
The HIPERLAN/2 protocol stack consists of the physical layer, convergence layer (CL),
and the data link control (DLC) layer.
The CL
The topmost layer in the HIPERLAN/2 protocol stack is the CL. The functions of the
layer are to adapt the requirements of the different higher layers of the core network with
the services provided by the lower layers of HIPERLAN/2, and to convert the higher
layer packets into ones of fixed size that can be used by the lower layers.
Security Issues
Elaborate security mechanisms exist in the HIPERLAN/2 system. The encryption
procedure is optional and can be selected by the MT during association.
Two strong encryption algorithms are offered, namely, the data encryption standard
(DES) and the triple-DES algorithms.