The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network (WSN) has been widely used in many important areas. MAC protocols have a significant effect on the function of WSN. This paper introduced various important MAC protocols, analyzed the fundamental mechanism of each MAC protocol in details, and compared the characteristics and performances of each MAC protocol. Finally, the future research strategies and trends of MAC protocols...
In this paper, we perform a detailed study of the Binary Exponential Back-off Algorithm (BEBA) that is widely used in distributed MAC protocols to avoid collision when more than one machine try to access the medium in ad hoc network at the same time. We begin with a generalized framework of modeling of BEBA. Then we identify a key difference between BEBA and the commonly assumed p-persistent model...
This paper identifies a class of potential vehicular network applications that are geographically localized and restricted to groups of vehicles. Applications such as group voice or text chat, periodic location updates and rear-seat gaming require content to be published and consumed by group members. In this framework, content delivery performance is the key metric. In this paper, we study the performance...
The function and structure and the architecture of sensor network based on ZigBee/802.15.4 standard for forest monitoring are designed in this paper. According to the features of forest monitoring, the sensor nodes based on CC2520 and low power consumption chip MSP430F5437 and the coordinator Combing with ARM are designed which realize the energy control in physical layer. With the wireless sensor...
A new reliable cooperative MAC protocol called RCO-MAC is proposed, and the protocol's performance is evaluated with numerical analysis and computer simulation. The key concept for this RCO-MAC protocol is to give the responsibility of the error recovery by retransmission for a frame to the node that transmits the frame. The system throughput is used as a performance metric. According to numerical...
The performance of a cross-layer (physical and MAC) design for multiple-input multiple-output (MIMO) system that maximizes the throughput of ad-hoc networks by selecting the optimum antenna combination is investigated. This cross-layer design is shown to improve the overall network performance relative to the case with no antenna selection. To further improve the overall network throughput, we minimize...
We discuss protocols for all-to-all dissemination in ad-hoc wireless networks. We identify shortcomings and challenges related to high traffic and explore their causes by observing the performance at the MAC layer. Through simulations we show that a congestion assessment mechanism can reduce more than 1/4 of the traffic on a good part of the nodes without affecting dissemination performance. We conclude...
In this paper, we consider a DTN/WLAN integrated network where high-mobility nomadic nodes form a delay tolerant network (DTN) and low-mobility local nodes reside in the coverage area of wireless local area networks (WLANs). A data dissemination service facilitated by packet pre-downloading is generated by a server in the Internet and destined to a group of nomadic nodes. In order to achieve efficient...
This article presents a new MAC layer protocol for IEEE 802.11 EDCA-based ad-hoc networks with hidden nodes. The key idea of the proposed solution is based on an intelligent two-step reservation procedure which is combined with the advantages of EDCA service differentiation. The new protocol achieves significant performance improvement for high priority traffic (e.g., Voice) in terms of fairness,...
Social ad-hoc networks can be composed of a large number of tiny, wireless, battery-powered nodes, and exhibit arbitrary mobility. We aim to enable the execution of distributed applications that depend on capturing network dynamics across large-scale social ad-hoc networks. Conservation of the nodes' fixed energy budget is the chief concern in all design decisions, and necessitates that wireless communication...
Intermittent connectivity is common in certain wireless access networks. Existing network protocols are not resilient to disruption of communication links and communication often fails when faced with sporadic connectivity. Thus in recent years there is a growing interest in Intermittently Connected Mobile Networks (also know as Mobile Opportunistic Networks) and many routing protocols have been proposed...
This paper proposes a technique for topology control (TC) of wireless nodes to meet Quality of Service (QoS) requirements between source and destination node pairs. The nodes are assumed to use a TDMA (Time Division Multiple Access) based MAC (Medium Access Control) layer. Given a set of QoS requirements, a set of wireless nodes and their initial positions, the goal is to find a topology of the nodes...
This paper presents an infrastructure sensor network and an adaptive MAC. The sensor network is intended for low power wireless sensor monitoring network which could tolerate certain amount of packet loss. Trade-off between power consumption and packet loss rate which application could tolerate is made. An adaptive MAC, which will choose Just-Send mechanism or classic pure ALOHA technique according...
Wireless ad-hoc networking will be a fundamental component of emerging technologies such as multi-hop cellular networks, vehicular ad-hoc networks and wireless mesh networks, with most of these technologies based on evolved versions of the 802.11 standard. To achieve their expected benefits, and address their challenges, in terms of energy efficiency, reliability or reconfigurability, advanced cooperative...
In wireless multihop ad hoc networks, the hidden terminal problem severely degrades the overall performance. On the other hand, most existing solutions cause larger blocking areas and hence a more severe exposed-terminal problem. In this paper, we present a new Enhanced Busy-tone Multiple Access (EBTMA) medium access control (MAC) protocol. The proposed protocol minimizes the negative impact of both...
This paper introduces a novel paradigm for designing the physical and medium access control (MAC) layers of mobile ad hoc or peer-to-peer networks formed by half-duplex radios. A node equipped with such a radio cannot simultaneously transmit and receive useful signals at the same frequency. Unlike in conventional designs, where a node's transmission frames are scheduled away from its reception, each...
Ad-hoc Networks have been proposed for a variety of applications where support for real time, multimedia services may be necessary. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport are needed. We take a holistic approach to the problems in ad hoc networks. We start by postulating general design principles for power control based...
This paper propose an energy efficient analysis on MAC (Medium Access Control) protocols for a wireless body sensor network. WSN (Wireless Sensor Network) have usually battery-operated computing and sensing devices. A network of these devices will collaborate into a common application such as environmental or heath monitoring. Deploying such network in an ad hoc configuration implies that some individual...
Supporting video transmission over error-prone wireless ad-hoc networks is becoming increasingly important as these networks become more widely deployed. In this paper, we propose a routing-aware multiple description video coding approach to support video transmission over wireless ad-hoc networks with path diversity. Our method uses the standard ad-hoc routing messages to estimate the possible packet...
In order to become truly ubiquitous, the Internet of Things (IoT) has to evolve to provide connectivity anytime, any place, for any thing. IEEE 802.15.4-based wireless personal area networks (WPANs) is a preferable communication method for IoT. Wireless personal area networks (WPANs) are used to convey information over relatively short distances. Connections effected via WPANs involve little or no...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.