A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks
نویسندگان
چکیده
Medium access control (MAC) protocols provide a means to nodes to access the wireless medium efficiently and collision free to the best of their ability. In this paper we provide a survey of MAC protocols developed for mobile ad hoc (MANETs) in the past based on certain methods and techniques such as multiple radios, multiple channels and specialized beamforming antennas. We discuss some of the MAC protocols designed for wireless sensor networks (WSNs) and their applicability in a MANET environment. There are some similarities between MANETs and WSN’s in general but there is also critical differences between the two that affect the design of MAC protocols for both these networks. Traditionally, MAC protocols have been classified on the basis of two broad categories of contention free and contention based MAC protocols but a number of new algorithms proposed in the recent past merge the two schemes together in a single MAC solution and thus there is a need for a new classification approach. MANETs have their unique constraints and characteristics. In this classification, we will discuss various MAC solutions proposed in the past in the light of these constraints and characteristics. We do not intend to explain each and every protocol since the number of MAC solutions proposed in the past decade or so is very large. The purpose of this article is to give the readers a general idea on the various techniques and methods used in literature to develop MAC protocols for MANETs. The techniques range from algorithmic changes such as cross-layer design to enhancement in hardware such as directional antennas.
منابع مشابه
Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملMulti-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey
Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCM
دوره 9 شماره
صفحات -
تاریخ انتشار 2014