Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Analyzing MAC Protocol for Wireless Ad-hoc Networks  
  Authors : Gopal Singh Bhadoriya; Reena Chauhan
  Cite as:

 

Ad-hoc wireless networks are one of the fastest growing technology in the today’s world. It is a collection of nodes which dynamically form a temporary network without any infrastructure. Medium Access Control(MAC) protocols are responsible for coordinating the access from active nodes in this network. MAC protocols are very importance for the wireless communication channel is inherently prone to errors and some problems such as hidden terminal problem and exposed terminal problem. Although a lot of researcher has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. so, in this survey paper we present a classification of MAC protocols and their brief dicription, based on their operating principles and underlying features.

 

Published In : IJCSN Journal Volume 5, Issue 1

Date of Publication : February 2016

Pages : 46-49

Figures :02

Tables : --

Publication Link : Analyzing MAC Protocol for Wireless Ad-hoc Networks

 

 

 

Gopal Singh Bhadoriya : Department of Computer Science, ITM University, Gwalior, M.P., India

Reena Chauhan : Department of Computer Science, ITM University, Gwalior, M.P., India

 

 

 

 

 

 

 

Ad-hoc Network

Issues

MAC Protocols

Security

Mobile Ad-hoc network is a current investigation topic. For efficient MAC protocol many investigations have been done. In this paper we have tried to survey MAC protocol mainly from a technical point of view. This paper provides the fastest study of MAC protocol with various research issues. These issues may be used for further research work for improving the network’s performance.

 

 

 

 

 

 

 

 

 

[1] L. Kleinrock and F.A. Tobagi, “Packetitching in radio channels: Part II - The hidden terminal problem in carrier sense multiple-access and the busy-tone solution,” IEEE Trans. Commun. vol. COM-23. pp. 1417-1433, December 1975 [2] Z.J. Haas and J. Deng, “Dual Busy Tone Multiple Access (DBTMA) - A multiple access control scheme for ad hoc networks,” IEEE Transactions on Communications, vol. 50, no. 6, June 2002 [3] N. Jain, S.R. Das, and A. Nasipuri, “A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks,” in Proceedings of the Tenth International Conference on Computer Communications and Networks, 200 [4] Z. Tang and J.J. Garcia-Luna-Aceves, “Collisionavoidance transmission scheduling for ad-hoc networks,” IEEE, 2000, pp. 1788-1794 [5] W. Ye, J. Heidemann, and D. Estrin, “An energyefficient MAC protocols for wireless sensor networks,” in Proceedings of the IEEE Infocom 2002, New York, NY, June 2002, pp. 1567-1576 [6] P.J.M. Havinga, “EMACs - EYES MAC protocol for sensor networks,” 7th Wireless World Research Forum, December 2002 [7] Shivani rao, Sanjeev khambra “A comparative analysis of MAC protocols in MANET” (IJETAE-2013). [8] Prof. Neeraj agarwal, Dr. Sanjeev Sharma, Prof. Arun Nahar “Analysis of CSMA, MACA & EMACA(Enhancement of Multiple Accesses with Collision Avoidance) to Support QoS under varying conditions of No. of Nodes in Ad-Hoc Wireless Networks by means of DSR Routing Protocol” (IJCA- 2010). [9] C.Siva Ram Murthy and B.S Manoj, Mobile Ad Hoc Networks- Architectures & Protocols , Pearson Education, [10] R. Hekmat and P. Van Mieghem, “Interference in Wireless Multi-hop Ad-hoc Networks and its Effect on Network Capacity,” Wireless Networks Journal, Special Issue on Ad-hoc Networking, February 2003. [11] LAN MAN Standards Commitee of the IEEE Computer Society, Wireless LAN medium access control (MAC) and physical layer (PHY) specification, IEEE, New York, NY, USA, IEEE Standard 802.11- 1999, 1999 [12] C.K. Toh, “MARCH: a medium access control protocol for multihop wireless ad hoc networks,” MILCOM 2000, 21st Century Military Communications Conference Proceedings, 2000 [13] Shugong Xu, Tarek Saadawi, ?Does the IEEE 802.11 Mac protocol work well in multihop wireless adhoc networks, City university of New York, June 2001. [14] Eustathia Ziouva, Theodore, CSMA/CA performance underhigh traffic conditions: throughput and delay analysis,? Journal on computer communications,vol. 25, pp. 313-32, 2002. [15] Yihong Zhou, Scott M. Nettles, ?Balancing the hidden and exposed node problems with power control in CSMA/CA based wireless networks,? IEEE Conference on Wireless Communications and networking, Austin USA, vol. 2, pp. 683-688, 2005.