05.01.2013 Views

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

Ad Hoc Networks : Technologies and Protocols - University of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

202 Use <strong>of</strong> Smart Antennas in <strong>Ad</strong> <strong>Hoc</strong> <strong>Networks</strong><br />

Figure 7.2. The Cone <strong>and</strong> Sphere Radiation Pattern<br />

contention-based MAC protocol in ad hoc network research. Scheduled access,<br />

on the other h<strong>and</strong>, attempts to schedule transmissions in advance to reduce the<br />

possibility <strong>of</strong> collisions. <strong>Protocols</strong> that use scheduled access might proactively<br />

allocate b<strong>and</strong>width based on a number <strong>of</strong> criteria that may include the topology,<br />

the generated traffic <strong>and</strong> priority <strong>of</strong> various nodes.<br />

We begin with a very brief discussion <strong>of</strong> the IEEE 802.11 MAC protocol<br />

<strong>and</strong> then go on to point out the problems that one would face if this protocol<br />

is used “as is” with directional antennas. We then discuss various approaches<br />

that have been proposed for addressing these problems. Finally, we discuss the<br />

few approaches that have been proposed for scheduled access.<br />

7.3.1 The IEEE 802.11 MAC Protocol in Brief<br />

The Distributed Co-ordination Function (DCF) specified in the IEEE 802.11<br />

MAC st<strong>and</strong>ard has been popularly advocated for ad hoc networks. The DCF<br />

function is based on co-ordinating medium occupancy using carrier sense multiple<br />

access with collision avoidance (CSMA/CA). The approach alleviates the<br />

hidden terminal problem that arises in wireless networks by the use <strong>of</strong> a simple<br />

CSMA scheme.<br />

In the IEEE 802.11 MAC protocol, a transmitter sends a Request to Send<br />

(RTS) message to a recipient neighbor when it wishes to send a data packet<br />

to that neighbor. The RTS message implicitly informs the neighboring nodes<br />

within the omni-directional range <strong>of</strong> the transmitting node that a data transfer<br />

is being initiaited. If possible, the receiver would then respond with a Clear to<br />

Send or CTS message. The CTS message implicitly informs the nodes in the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!