Ad-hoc wireless networks are one of the fastest
growing technology in the today’s world. It is a collection of
nodes which dynamically form a temporary network without
any infrastructure. Medium Access Control(MAC) protocols
are responsible for coordinating the access from active nodes
in this network. MAC protocols are very importance for the
wireless communication channel is inherently prone to errors
and some problems such as hidden terminal problem and
exposed terminal problem. Although a lot of researcher has
been conducted on MAC protocols, the various issues
involved have mostly been presented in isolation of each
other. so, in this survey paper we present a classification of
MAC protocols and their brief dicription, based on their
operating principles and underlying features.
Gopal Singh Bhadoriya : Department of Computer Science, ITM University, Gwalior, M.P., India
Reena Chauhan : Department of Computer Science, ITM University, Gwalior, M.P., India
Ad-hoc Network
Issues
MAC Protocols
Security
Mobile Ad-hoc network is a current investigation topic. For
efficient MAC protocol many investigations have been
done. In this paper we have tried to survey MAC protocol
mainly from a technical point of view. This paper provides the fastest study of MAC protocol with various research
issues. These issues may be used for further research work
for improving the network’s performance.
[1] L. Kleinrock and F.A. Tobagi, “Packetitching in radio
channels: Part II - The hidden terminal problem in
carrier sense multiple-access and the busy-tone
solution,” IEEE Trans. Commun. vol. COM-23. pp.
1417-1433, December 1975
[2] Z.J. Haas and J. Deng, “Dual Busy Tone Multiple
Access (DBTMA) - A multiple access control scheme
for ad hoc networks,” IEEE Transactions on
Communications, vol. 50, no. 6, June 2002
[3] N. Jain, S.R. Das, and A. Nasipuri, “A multichannel
CSMA MAC protocol with receiver-based channel
selection for multihop wireless networks,” in
Proceedings of the Tenth International Conference on
Computer Communications and Networks, 200
[4] Z. Tang and J.J. Garcia-Luna-Aceves, “Collisionavoidance
transmission scheduling for ad-hoc
networks,” IEEE, 2000, pp. 1788-1794
[5] W. Ye, J. Heidemann, and D. Estrin, “An energyefficient
MAC protocols for wireless sensor networks,”
in Proceedings of the IEEE Infocom 2002, New York,
NY, June 2002, pp. 1567-1576
[6] P.J.M. Havinga, “EMACs - EYES MAC protocol for
sensor networks,” 7th Wireless World Research Forum,
December 2002
[7] Shivani rao, Sanjeev khambra “A comparative analysis
of MAC protocols in MANET” (IJETAE-2013).
[8] Prof. Neeraj agarwal, Dr. Sanjeev Sharma, Prof. Arun
Nahar “Analysis of CSMA, MACA &
EMACA(Enhancement of Multiple Accesses with
Collision Avoidance) to Support QoS under varying
conditions of No. of Nodes in Ad-Hoc Wireless
Networks by means of DSR Routing Protocol” (IJCA-
2010).
[9] C.Siva Ram Murthy and B.S Manoj, Mobile Ad Hoc
Networks- Architectures & Protocols , Pearson
Education,
[10] R. Hekmat and P. Van Mieghem, “Interference in
Wireless Multi-hop Ad-hoc Networks and its Effect on
Network Capacity,” Wireless Networks Journal,
Special Issue on Ad-hoc Networking, February 2003.
[11] LAN MAN Standards Commitee of the IEEE
Computer Society, Wireless LAN medium access
control (MAC) and physical layer (PHY) specification,
IEEE, New York, NY, USA, IEEE Standard 802.11-
1999, 1999
[12] C.K. Toh, “MARCH: a medium access control
protocol for multihop wireless ad hoc networks,”
MILCOM 2000, 21st Century Military
Communications Conference Proceedings, 2000
[13] Shugong Xu, Tarek Saadawi, ?Does the IEEE 802.11
Mac protocol work well in multihop wireless adhoc
networks, City university of New York, June 2001.
[14] Eustathia Ziouva, Theodore, CSMA/CA performance
underhigh traffic conditions: throughput and delay
analysis,? Journal on computer communications,vol.
25, pp. 313-32, 2002.
[15] Yihong Zhou, Scott M. Nettles, ?Balancing the
hidden and exposed node problems with power control
in CSMA/CA based wireless networks,? IEEE
Conference on Wireless Communications and
networking, Austin USA, vol. 2, pp. 683-688, 2005.