MAC Protocols
MAC Protocols
Medium Access Control (MAC) protocols solve a seemingly simple task: they coordinate the
times where a number of nodes access a shared communication medium.
Medium Access Control (MAC) protocols is the first protocol layer above the Physical Layer
(PHY) and consequently MAC protocols are heavily influenced by its properties.
The fundamental task of any MAC protocol is to regulate the access of a number of nodes
to a shared medium in such a way that certain application-dependent performance
requirements are satisfied.
Some of the traditional MAC protocols performance criteria are delay, throughput, and
fairness, whereas in WSNs, the issue of energy conservation becomes important.
Within the OSI reference model, the MAC is considered as a part of the Data Link Layer
(DLL), but there is a clear division of work between the MAC and the remaining parts of the
DLL.
The MAC protocol determines for a node the points in time when it accesses the medium to
try to transmit a data, control, or management packet to another node (unicast) or to a set
of nodes (multicast, broadcast).
Two important responsibilities of the remaining parts of the DLL are error control and flow
control. Error control is used to ensure correctness of transmission and to take appropriate
actions in case of transmission errors and flow control regulates the rate of transmission to
protect a slow receiver from being overwhelmed with data
In a Wireless Sensor Network (WSN), many sensor nodes talk to each other using radio signals -
kind of like people talking in a room.
But if everyone talks at the same time, no one can understand anything. It becomes chaos! So,
we need rules to decide who gets to talk and when. These rules are called the MAC protocol.
Issues are:
2.Handling Collisions:
When multiple nodes send data at the same time, the signals collide.
Receiver can’t understand the data, so it asks to resend.
This wastes time and energy.
3.Time-Critical Needs:
4.Wireless Challenges:
5.Range Limitation:
Issue:
A sends data to B
C checks the channel, finds it free (can’t hear A), and starts sending
Both signals collide at B
Example:
B sends to A
C wants to send to D
C senses B’s signal and waits, even though it could have safely sent data
Signals fade
Transceivers are half-duplex (can’t send and receive at the same time)
Need: MAC must handle both low and high traffic efficiently.
In these protocols, each device (or node) gets a specific portion of the communication resource
permanently or for a long time (minutes or hours). This avoids collisions since no one else uses
the same resource.
Features:
Examples:
Time is split into frames and each frame into time slots
Each node gets its own slot
Requires precise time synchronization
All nodes share the same frequency and time, but use different codes
Receiver must know the code
Other transmissions appear as noise
Code management is crucial
These protocols assign resources only when needed, typically for the time it takes to send one
data burst.
Two Types:
Energy-saving tip: If no node has enough power to always act as a central controller, roles can
rotate (as in the LEACH protocol).
No central controller
Use a shared rule or object, like a token
Nodes act independently and randomly. No central control. These are fully distributed.
Features:
Easy to implement
Risk of collisions due to uncoordinated access
Use randomness to reduce conflicts
Examples:
ALOHA:
Slotted ALOHA:
Time is divided into slots
Packets can only start at the beginning of a slot
Lower collision chance, better than pure ALOHA
If busy → it waits
Types:
Problems with CSMA: Hidden Terminal Problem: A node may not detect another node’s signal,
causing a collision at the receiver
Solutions:
One channel for data, another (control) channel sends a busy tone when a node receives a
packet
Nearby nodes sense the tone and don’t transmit
2. RTS/CTS (Request to Send / Clear to Send): A handshake between sender and receiver to
warn nearby nodes
S-MAC Protocol:
S-MAC is a protocol designed for wireless sensor networks to:
Working Principle:
Synchronization:
1. SYNCH Phase:
Mechanisms Used:
1. RTS/CTS Handshake
2. Broadcast Mode:
Network Behavior:
Latency:
Message Passing:
Fragmentation in S-MAC:
Retransmission:
If a fragment fails:
Limitations of S-MAC:
T-MAC: An Improvement
B-MAC protocol,
Dissemination protocol for large sensor network.
Routing protocols:
Issues in designing routing protocols,
Classification of routing protocols,
Energy efficient routing,
Unicast, Broadcast and multicast,
Geographic routing.