Filters








324 Hits in 7.9 sec

A survey on control separation techniques in multi-radio multi-channel MAC protocols

J. C.-P. Wang, M. Abolhasan, F. Safaei, D. Franklin
2007 2007 International Symposium on Communications and Information Technologies  
In this paper, the control separation techniques in the multi-radio multi-channel MAC have been surveyed, and a classification of control separation techniques is provided.  ...  In this paper, the control separation techniques in the multi-radio multi-channel MAC have been surveyed, and a classification of control separation techniques is provided.  ...  The tone-based scheme identifies that the conventional RTS/CTS handshake does not solve hidden terminal problem completely as RTS may collide with other RTS.  ... 
doi:10.1109/iscit.2007.4392135 fatcat:zzipf2b64fdnfafltg4eulknvq

Directional MAC Protocols in Ad-Hoc Networks

Sudipta Majumder, Syed Emdadul Haque, Fernaz Narin Nur
2014 International Journal of Computer Applications  
This survey gives a comprehensive overview of Medium Access Control (MAC) protocols which directly or indirectly address this problem.  ...  However, traditional Medium Access Control (MAC) protocols fail to exploit the potential benefits due to the unique characteristics of wireless ad-hoc networks with beam forming antennas.  ...  Finally, to our best knowledge in the literature there is no survey which elaborates on the complexity of the problems in detail.  ... 
doi:10.5120/17571-8259 fatcat:khbietwfqncsrcqf73n3v3lgdi

Quality Based Performance of Leach-Rfid by using Contention Avoidance Algorithm

2019 International journal of recent technology and engineering  
The packet loss is more in LeachRFID protocol due to non synchronization of the nodes. The simulation results shows between leach and Leach-RFID  ...  Because the problems arising of packet loss due to non-synchronization of clocks. To overcome this problem avoidance contention algorithm is applied. This enhancement is based on RTS/CTS packets.  ...  We have to resolve the question of efficiency preservation.  ... 
doi:10.35940/ijrte.b1124.0782s319 fatcat:wjcyba7t6rae3absaav4u73ewu

CENTAUR

Vivek Shrivastava, Nabeel Ahmed, Shravan Rayanchu, Suman Banerjee, Srinivasan Keshav, Konstantina Papagiannaki, Arunesh Mishra
2009 Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09  
The data path of WLANs, however, continues to use the distributed, random-access model, as defined by the popular DCF mechanism of the 802.11 standard.  ...  We perform extensive measurements to characterize the impact of various design choices, like scheduling granularity on the performance of a centralized scheduler, and identify regions where such a centralized  ...  Acknowledgment We wish to acknowledge Sharad Saha and Siddharth Barman, for help during the experiments and providing constructive feedback on the earlier versions of the paper.  ... 
doi:10.1145/1614320.1614353 dblp:conf/mobicom/ShrivastavaARBKPM09 fatcat:anwotk3ou5dm3koetx25s7t2um

Medium access control in mobilead hoc networks: challenges and solutions

Hongqiang Zhai, Jianfeng Wang, Xiang Chen, Yuguang Fang
2006 Wireless Communications and Mobile Computing  
Then we discuss the proposed MAC schemes according to their design goals, focusing on some critical design issues and tradeoffs. Finally, we point out some future research directions.  ...  This paper surveys the recent advances in MAC design for MANETs. we first identify the challenges that are facing MAC in MANETs.  ...  Since it will stop if the RTS/CTS exchange fails, it resolves the erroneous reservation problem in the IEEE 802.11 protocol.  ... 
doi:10.1002/wcm.376 fatcat:ub45o6vfqjeyxgyivw3uw4ark4

Medium Access Control protocols for ad hoc wireless networks: A survey

Sunil Kumar, Vineet S. Raghavan, Jing Deng
2006 Ad hoc networks  
We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area.  ...  These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem  ...  The MACA scheme [13] was proposed to solve these problems with the help of two relatively short RTS/CTS control packets.  ... 
doi:10.1016/j.adhoc.2004.10.001 fatcat:jgup4622xvhtrneikj5gyracdq

Analysis of 802.11b MAC: A QoS, Fairness, and Performance Perspective [article]

Srikant Sharma
2004 arXiv   pre-print
In this survey report, we identify and argue that the Medium Access Controller for 802.11b networks is the prime area for these improvements.  ...  To enunciate our claims we highlight some of the quality of service, fairness, and performance issues related to 802.11b MAC.  ...  This mechanism leverages on the RTS/CTS messages exchanged during the collision avoidance phase to deduce the directionality of transmission and RTS/CTS threshold values to carry out parallel data transmissions  ... 
arXiv:cs/0411017v1 fatcat:u6qmal3zzraavfaguah2vqv6fe

A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks

Noor Mast, Thomas J Owens
2011 EURASIP Journal on Wireless Communications and Networking  
Owing to these specific characteristics of wireless ad hoc networks, TCP faces particular problems with, for example, route failure, channel contention and high bit error rates.  ...  The research community has produced a wide range of proposals to improve the performance of TCP in wireless ad hoc networks. This article presents a survey of these proposals (approaches).  ...  The RTS/CTS is basically designed to tackle the hidden terminal problem. In the RTS/CTS mechanism, a sending node sends a RTS message to the receiving node before transmitting a data frame.  ... 
doi:10.1186/1687-1499-2011-96 fatcat:3dpmvvomang3loghygmeurez5q

MAC Protocols for Wireless Mesh Networks with Multi-beam Antennas: A Survey [chapter]

Gang Wang, Yanyuan Qin
2019 Food Tourism in Asia  
This paper surveys the MAC protocols for wireless mesh networks with multi-beam antennas.  ...  Traditional Medium Access Control (MAC) protocols for wireless network largely relied on the IEEE 802.11 Distributed Coordination Function(DCF) mechanism, however, IEEE 802.11 DCF cannot take the advantages  ...  For this problem, one solution in traditional network is to implement a RTS/CTS handshaking mechanism before real data transmission, thus avoiding the occurrence of collision [29] .  ... 
doi:10.1007/978-3-030-12388-8_9 fatcat:5fz5yw7lxjakjcv6wx624cmrsu

An energy-efficient communication system using joint beamforming in multi-hop health monitoring sensor networks

Bhoomek Pandya, Fu-Kai Chuang, Chien-Hsun Tseng, Tzi-Dar Chiueh
2017 EURASIP Journal on Wireless Communications and Networking  
Based on this aim, the proposed system adopts multi-hop transmission and joint transmitter-receiver beamforming technique to efficiently transmit data at significantly reduced transmission power.  ...  Furthermore, to shorten the transmission latency and reduce channel contention, we proposed a novel Medium Access Control (MAC) mechanism which includes neighborhood discovery, packet collision detection  ...  Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.  ... 
doi:10.1186/s13638-017-0957-5 fatcat:7xuacunxxfeell6ogagok4ea2y

Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks

Jims Marchang, Bogdan Ghita, David Lancaster
2017 Ad hoc networks  
MAC (LBT-NA with optimized-EIFS MAC) that aims to reduce the transmission power when communicating with the next hop receiver based on node's location which is made available during node deployment.  ...  over IEEE 802.11b ranges from 30% to 70% depending on the type of traffics in the network and the degree of fairness ranges from 62% to 99.99% for a location based MAC with minimum power transmission,  ...  for providing the platform to conduct the research work.  ... 
doi:10.1016/j.adhoc.2017.06.001 fatcat:vzkyvbdgxzel3mc2ipmjuskhby

Energy Conservation MAC Protocols with Low Duty Cycling for WSN: A Review

Dhanpratap Singh, Jyoti Singhai
2015 International Journal of Computer Applications  
These protocols are based on the work done on the Medium Access Control layer of TCP/IP protocol suit. General Terms Low power listening, Wake-up schedule, synchronization  ...  This paper presents critical reviews on recent development in various MAC protocols for saving energy in wireless sensor network by modifying duty cycle.  ...  The technique is something different than IEEE 802.11 RTS-CTS technique.  ... 
doi:10.5120/19228-0939 fatcat:2gacfdwp5jc7zpfhimfgcxgzj4

A survey on quality-of-service support for mobile ad hoc networks

Dmitri D. Perkins, Herman D. Hughes
2002 Wireless Communications and Mobile Computing  
This work is intended to provide a broad and comprehensive view of the various components and protocols required to provide QoS support in computer networks, focusing primarily on ad hoc networks.  ...  We also discuss the impact of these characteristics on QoS provisioning.  ...  as opposed to the RTS-CTS dialogue.  ... 
doi:10.1002/wcm.73 fatcat:r2gde7a2mrehhcvh34uzyyu3du

Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper)

Sandra Sendra, Jaime Lloret, Miguel Garcia, José F. Toledo
2011 Journal of Communications  
In this work, we present a survey of power saving and energy optimization techniques for wireless sensor networks, which enhances the ones in existence and introduces the reader to the most well known  ...  Energy consumption is one of the biggest constraints of the wireless sensor node and this limitation combined with a typical deployment of large number of nodes have added many challenges to the design  ...  ICSMA access mechanism is based on the RTS-CTS-DATA-ACK access mechanism of the IEEE 802.11 DCF.  ... 
doi:10.4304/jcm.6.6.439-459 fatcat:cts4dg3yvra3zczzky77ynhj3y

An Overview of WLAN Performance, Some Important Case-Scenarios and Their Associated Models

Federico Larroca, Fernanda Rodríguez
2014 Wireless personal communications  
The present survey is an effort to classify and present the enormous literature on the subject into several important casescenarios, and summarizes the current understanding of WLAN performance.  ...  The resulting performance and associated models are discussed (and sometimes extended) and simulation results are used to illustrate them.  ...  All in all, the capture phenomena, and its associated unfairness, is exacerbated by the RTS/CTS mechanism due to the combined effects of a (generally) lower modulation rate and smaller packets involved  ... 
doi:10.1007/s11277-014-1846-4 fatcat:gagufe7zqjclfky2fywwmhtupe
« Previous Showing results 1 — 15 out of 324 results