Second Quarter 2012, IEEE Communications Surveys & Tutorials

Ekram Hossain
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
I WELCOME you to the second issue of ComST in 2012. This issue includes twenty articles covering different aspects of communication networks. In particular, issues related to medium access control (MAC), routing, and security in wireless ad-hoc and sensor networks, trust computation and trust dynamics in wireless ad-hoc networks, wireless mesh network design, wireless network debugging, resource allocation in orthogonal frequency-division multiple access (OFDMA)-based wireless networks,
more &raquo; ... ity, security, and robustness in wireless networks, security in cognitive radio networks, design of multiple-input multiple-output (MIMO)based wireless networks, scalability and speed of convergence of routing protocols for the Internet, multihoming of users in the Internet using the stream transmission control protocol (STCP), video communications, voice over IP (VoIP) services, autonomic network architectures, protocols for anonymous networks, and disruption-tolerant networking. A brief account for each of the articles included in this issue is given below. In wireless and mobile ad-hoc networks (MANETs), directional antennas can offer higher gains in terms of spectral frequency reuse, power efficiency and transmission range. Motivated by these gains, the first paper of this issue titled "A Survey on MAC Protocols for Wireless Ad-hoc Networks with Beamforming Antennas" by Osama Bazan and Muhammad Jaseemuddin overviews the different MAC protocols proposed in the literature for wireless ad-hoc networks with beamforming antennas. This tutorial provides a taxonomy of these MAC protocols based on their mode of operation and the mechanisms used to address the challenges. Based on the provided taxonomy, a discussion on the different basic design choices for the MAC protocols along with their associated tradeoffs are presented. This tutorial also enlists and discusses the main challenges for designing the MAC protocols in wireless ad-hoc networks with beamforming antennas. Energy efficiency is not the only design objective for wireless sensor networks (WSNs) supporting mission-critical applications. According to the supported applications, some performance parameters should be guaranteed to satisfy the application constraints. Taking this tradeoff into consideration, the paper titled "A Survey of MAC Protocols for Mission-Critical Applications in Wireless Sensor Networks" by Petcharat Suriyachai, Utz Roedig, and Andrew Scott reviews the MAC protocols for sensor networks available in the literature and evaluates the suitability of each of them to support different types of mission-critical applications. The authors show that the existing solutions have a number of
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="">doi:10.1109/surv.2012.042412.00000</a> <a target="_blank" rel="external noopener" href="">fatcat:7fwzkbm5t5crjkcokacrs5t3li</a> </span>
<a target="_blank" rel="noopener" href=";arnumber=6194371&amp;isnumber=6194370" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href=""> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> </button> </a>