Academic literature on the topic 'Contention-based MAC protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Contention-based MAC protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Contention-based MAC protocols"

1

Pei, Zhonghui, Xiaojun Wang, Zhen Lei, Hongjiang Zheng, Luyao Du, and Wei Chen. "Joint Optimization of Multi-Hop Broadcast Protocol and MAC Protocol in Vehicular Ad Hoc Networks." Sensors 21, no. 18 (September 11, 2021): 6092. http://dx.doi.org/10.3390/s21186092.

Full text
Abstract:
Beacon messages and emergency messages in vehicular ad hoc networks (VANETs) require a lower delay and higher reliability. The optimal MAC protocol can effectively reduce data collision in VANETs communication, thus minimizing delay and improving reliability. In this paper, we propose a Q-learning MAC protocol based on detecting the number of two-hop neighbors. The number of two-hop neighbors in highway scenarios is calculated with very little overhead using the beacon messages and neighbor locations to reduce the impact of hidden nodes. Vehicle nodes are regarded as agents, using Q-learning and beacon messages to train the near-optimal contention window value of the MAC layer under different vehicle densities to reduce the collision probability of beacon messages. Furthermore, based on the contention window value after training, a multi-hop broadcast protocol combined with contention window adjustment for emergency messages in highway scenarios is proposed to reduce forwarding delay and improve forwarding reliability. We use the trained contention window value and the state information of neighboring vehicles to assign an appropriate forwarding waiting time to the forwarding node. Simulation experiments are conducted to evaluate the proposed MAC protocol and multi-hop broadcast protocol and compare them with other related protocols. The results show that our proposed protocols outperform the other related protocols on several different evaluation metrics.
APA, Harvard, Vancouver, ISO, and other styles
2

Kristić, Ante, Julije Ožegović, and Ivan Kedžo. "Design and Modeling of Self-Adapting MAC (SaMAC) Protocol with Inconstant Contention Loss Probabilities." Wireless Communications and Mobile Computing 2018 (September 12, 2018): 1–25. http://dx.doi.org/10.1155/2018/6375317.

Full text
Abstract:
Networks based on IEEE 802.11 standard are one of the main options for deployment in industrial environment. Degradation of throughput in congested networks and short-term unfairness are well-known drawbacks of 802.11 DCF and similar MAC protocols. Those shortcomings represent significant limitation in forecasted growth of wireless usage. This is especially important in industrial wireless networks (IWN) where the scalability of wireless MAC is one of the main requirements. In this paper, a novel self-adapting MAC protocol (SaMAC) is defined and mathematically modeled. SaMAC employs constrained countdown freezing enhanced with shifted window mechanism. As a result, the protocol outperforms 802.11 DCF standard as well as shifted contention window (SCW) and constrained countdown freezing (CPCF) protocols in achieved throughput, fairness, and jitter, while keeping simple implementation. Despite protocol’s simple design, it is shown that its mathematical model is extremely complex. For proposed protocol, the assumption of constant contention loss probability, which is normally used for modeling of MAC schemes, does not hold. In the presented multidimensional Markov chain model, a unique iterative method for determining contention loss probability is developed as well as a method for throughput calculation based on such a chain. Accuracy of the presented model is verified in several network scenarios. Considering the performance of the proposed protocol, authors believe that it could be of benefit to deploy it in heavily loaded wireless networks with timing constraints, such as IWNs.
APA, Harvard, Vancouver, ISO, and other styles
3

Punitha, A., and Sujin P. Jose. "Survey of Energy Efficient and Contention Based MAC Protocol in WBAN for Medical and Consumer Supply Chain Application." International Journal of Green Computing 3, no. 2 (July 2012): 51–61. http://dx.doi.org/10.4018/jgc.2012070104.

Full text
Abstract:
The authors provide an extensive survey of recent energy-efficient and contention based medium access control (MAC) protocols for wireless body area networks (WBANs). They briefed the crucial applications of WBAN in present scenario and also discussed low-power and contention based MAC protocols for medical and consumer electronics. The authors outlined the future applications of WBAN and the enhancement to be incorporated to improve the efficiency of WBAN systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Alfouzan, Faisal Abdulaziz. "Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges." Journal of Marine Science and Engineering 9, no. 7 (July 4, 2021): 741. http://dx.doi.org/10.3390/jmse9070741.

Full text
Abstract:
The Medium Access Control (MAC) layer protocol is the most important part of any network, and is considered to be a fundamental protocol that aids in enhancing the performance of networks and communications. However, the MAC protocol’s design for underwater sensor networks (UWSNs) has introduced various challenges. This is due to long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. These unique acoustic channel characteristics make contention-based MAC protocols significantly more expensive than other protocol contentions. Therefore, re-transmission and collisions should effectively be managed at the MAC layer to decrease the energy cost and to enhance the network’s throughput. Consequently, handshake-based and random access-based MAC protocols do not perform as efficiently as their achieved performance in terrestrial networks. To tackle this complicated problem, this paper surveys the current collision-free MAC protocols proposed in the literature for UWSNs. We first review the unique characteristic of underwater sensor networks and its negative impact on the MAC layer. It is then followed by a discussion about the problem definition, challenges, and features associated with the design of MAC protocols in UWANs. Afterwards, currently available collision-free MAC design strategies in UWSNs are classified and investigated. The advantages and disadvantages of each design strategy along with the recent advances are then presented. Finally, we present a qualitative comparison of these strategies and also discuss some possible future directions.
APA, Harvard, Vancouver, ISO, and other styles
5

Yuan, Deying, Guoqiang Zheng, Huahong Ma, Jiaqing Shang, and Jishun Li. "An Adaptive MAC Protocol Based on IEEE802.15.6 for Wireless Body Area Networks." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–9. http://dx.doi.org/10.1155/2019/3681631.

Full text
Abstract:
The application carrier of wireless body area network (WBAN) is human; due to changes in people’s sports status or physical health and other reasons, the business traffic fluctuates greatly, which requires the network to have good adaptability. In addition, the energy consumption problem is also a key factor restricting the applications of the WBAN. At present, the proposed MAC protocol is not highly adaptive and has low energy efficiency. To solve this problem, this paper proposes an adaptive MAC protocol based on IEEE802.15.6 for WBAN (A-MAC). The protocol sets the data to three priorities according to the type of service; the superframe structure of IEEE802.15.6 is improved and reorganized into four phases: the beacon phase, the contention access phase, the noncontention access phase, and the inactive phase. The length of the contention access phase and the noncontention access phase is adjusted according to the proportion of nodes that generate each priority data. The contention access phase is further divided into three subphases, and the length of the subphase is dynamically adjusted according to the data priority. In the contention access phase, all nodes compete for access channel according to the channel access policy. The random data that competes successfully transmits data directly, and the periodic data that competes successfully transmits data in the allocated time slots of the noncontention access phase. Finally through the simulation of the proposed A-MAC protocol and IEEE 802.15.6 MAC protocol and CA-MAC protocol in network performance which were compared, the results show that in terms of throughput, power consumption, and the network time delay, the network performance using A-mac protocol is better than the network performance using IEEE802.15.6 MAC and CA-MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
6

Ait Aoudia, Fayçal, Matthieu Gautier, and Olivier Berder. "OPWUM: Opportunistic MAC Protocol Leveraging Wake-Up Receivers in WSNs." Journal of Sensors 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/6263719.

Full text
Abstract:
Opportunistic forwarding has emerged as a promising technique to address the problem of unreliable links typical in wireless sensor networks and improve energy efficiency by exploiting multiuser diversity. Timer-based solutions, such as timer-based contention, form promising schemes to allow opportunistic next hop relay selection. However, they can incur significant idle listening and thus reduce the lifetime of the network. To tackle this problem, we propose to exploit emerging wake-up receiver technologies that have the potential to considerably reduce the power consumption of wireless communications. A careful design of MAC protocols is required to efficiently employ these new devices. In this work, we propose Opportunistic Wake-Up MAC (OPWUM), a novel multihop MAC protocol using timer-based contention. It enables the opportunistic selection of the best receiver among its neighboring nodes according to a given metric (e.g., the remaining energy), without requiring any knowledge about them. Moreover, OPWUM exploits emerging wake-up receivers to drastically reduce nodes power consumption. Through analytical study and exhaustive networks simulations, we show the effectiveness of OPWUM compared to the current state-of-the-art protocols using timer-based contention.
APA, Harvard, Vancouver, ISO, and other styles
7

Lu, Jian Qiang, Wei Xing Wang, and Zuan Hui Lin. "The Analysis and Improvement of S-MAC Protocol for Wireless Sensor Networks." Advanced Materials Research 291-294 (July 2011): 2699–703. http://dx.doi.org/10.4028/www.scientific.net/amr.291-294.2699.

Full text
Abstract:
Nowadays Wireless Sensor Networks (WSN) has been widely used because of its adaptability, mobility and scalability. The MAC protocol is one of the most important network protocols which guarantee the WSN communication efficiency. The major concern of this paper is the typical contention-based MAC protocol in WSN—the S-MAC protocol. Considering the backoff algorithm of S-MAC protocol cannot resolve the fairness problem for nodes communication, the BDQR (Backoff Depends on Queue and Retry) backoff algorithm was presented in this paper. The experimental results demonstrated that by using this algorithm, nodes communication fairness was improved, channel collisions were reduced while network lifespan was prolonged.
APA, Harvard, Vancouver, ISO, and other styles
8

Chan, King-Sun, Lawrence K. Yeung, and Wenjian Shao. "Contention-based MAC protocols with erasure coding for wireless data networks." Ad Hoc Networks 3, no. 4 (July 2005): 495–506. http://dx.doi.org/10.1016/j.adhoc.2004.02.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lang, Jianjun, and Qigang Jiang. "An Energy-Efficient and Low-Latency MAC Protocol Based on Adaptive Coordination Contention Window for Wireless Sensor Networks." Open Electrical & Electronic Engineering Journal 8, no. 1 (December 31, 2014): 658–63. http://dx.doi.org/10.2174/1874129001408010658.

Full text
Abstract:
Wireless sensor network (WSN) consists of massive small sensor nodes which are located in monitoring region, the target of which is to cooperatively sense, collect and process the information of objects in the coverage area, then send the information to the observer through wireless communication. It can be widely used in military applications, medical treatment, traffic, environment monitoring and so on. Medium Access Control (MAC) Protocol, which decides how to share the wireless channel, allocates the limited communication resource among nodes and a good MAC protocol can save lots of energy and reduce collision. Firstly the thesis analyzed the research background and the current situation at home and abroad, and then discussed the structural characteristics of wireless sensor networks and other content, in which indicating the energy consumption of the wireless sensor network; Then, the thesis compared and analyzed the MAC protocols of the wireless sensor Network, focusing on competition-based MAC protocol S-MAC protocol in detail. From the shortcomings of the thesis proposed a new study of the improved protocol basing on the random work sleep scheduling mechanism; Finally, the thesis simulated the improving the MAC protocol, showing that the performances of the improved protocol are better than the original in improving energy efficiency, delay, throughput and so on from the analysis of simulation results.
APA, Harvard, Vancouver, ISO, and other styles
10

Alfouzan, Faisal, Alireza Shahrabi, Seyed Ghoreyshi, and Tuleen Boutaleb. "An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks." Sensors 18, no. 9 (August 25, 2018): 2806. http://dx.doi.org/10.3390/s18092806.

Full text
Abstract:
Underwater Sensor Networks (UWSNs) utilise acoustic waves with comparatively lower loss and longer range than those of electromagnetic waves. However, energy remains a challenging issue in addition to long latency, high bit error rate, and limited bandwidth. Thus, collision and retransmission should be efficiently handled at Medium Access Control (MAC) layer in order to reduce the energy cost and also to improve the throughput and fairness across the network. In this paper, we propose a new reservation-based distributed MAC protocol called ED-MAC, which employs a duty cycle mechanism to address the spatial-temporal uncertainty and the hidden node problem to effectively avoid collisions and retransmissions. ED-MAC is a conflict-free protocol, where each sensor schedules itself independently using local information. Hence, ED-MAC can guarantee conflict-free transmissions and receptions of data packets. Compared with other conflict-free MAC protocols, ED-MAC is distributed and more reliable, i.e., it schedules according to the priority of sensor nodes which based on their depth in the network. We then evaluate design choices and protocol performance through extensive simulation to study the load effects and network scalability in each protocol. The results show that ED-MAC outperforms the contention-based MAC protocols and achieves a significant improvement in terms of successful delivery ratio, throughput, energy consumption, and fairness under varying offered traffic and number of nodes.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Contention-based MAC protocols"

1

Katila, Charles Jumaa. "Mac protocols for linear wireless (sensor) networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7626/.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of a large number of sensor nodes, characterized by low power constraint, limited transmission range and limited computational capabilities [1][2].The cost of these devices is constantly decreasing, making it possible to use a large number of sensor devices in a wide array of commercial, environmental, military, and healthcare fields. Some of these applications involve placing the sensors evenly spaced on a straight line for example in roads, bridges, tunnels, water catchments and water pipelines, city drainages, oil and gas pipelines etc., making a special class of these networks which we define as a Linear Wireless Network (LWN). In LWNs, data transmission happens hop by hop from the source to the destination, through a route composed of multiple relays. The peculiarity of the topology of LWNs, motivates the design of specialized protocols, taking advantage of the linearity of such networks, in order to increase reliability, communication efficiency, energy savings, network lifetime and to minimize the end-to-end delay [3]. In this thesis a novel contention based Medium Access Control (MAC) protocol called L-CSMA, specifically devised for LWNs is presented. The basic idea of L-CSMA is to assign different priorities to nodes based on their position along the line. The priority is assigned in terms of sensing duration, whereby nodes closer to the destination are assigned shorter sensing time compared to the rest of the nodes and hence higher priority. This mechanism speeds up the transmission of packets which are already in the path, making transmission flow more efficient. Using NS-3 simulator, the performance of L-CSMA in terms of packets success rate, that is, the percentage of packets that reach destination, and throughput are compared with that of IEEE 802.15.4 MAC protocol, de-facto standard for wireless sensor networks. In general, L-CSMA outperforms the IEEE 802.15.4 MAC protocol.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Contention-based MAC protocols"

1

Kim, Min-Su, Tae-Young Byun, and Ki-Jun Han. "A Multiple Access Scheme Using Split and Merge Algorithm for Contention/Reservation-Based Wireless MAC Protocols." In Lecture Notes in Computer Science, 496–505. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39425-9_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Venugopal, K. R., Shiv Prakash T., and M. Kumaraswamy. "CBH-MAC: Contention-Based Hybrid MAC Protocol for WSNs." In QoS Routing Algorithms for Wireless Sensor Networks, 95–111. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2720-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Klein, Alexander. "BPS-MAC: Backoff Preamble Based MAC Protocol with Sequential Contention Resolution." In Multiple Access Communications, 39–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23795-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jeong, Hongkyu, Min-Gon Kim, and Hong-Shik Park. "A Data Profile-Based Contention-Free MAC Protocol for the Patient Monitoring Systems on WBANs." In Communications in Computer and Information Science, 192–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29219-4_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"COOPERATIVE CONTENTION-BASED MAC PROTOCOLS AND SMART ANTENNAS IN MOBILE AD HOC NETWORKS." In Distributed Antenna Systems, 219–58. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420042894-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Cooperative Contention-Based MAC Protocols and Smart Antennas in Mobile Ad Hoc Networks." In Wireless Networks and Mobile Communications, 201–40. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420042894.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Verma, Pawan Kumar, Rajesh Verma, Arun Prakash, and Rajeev Tripathi. "Massive Access Control in Machine-to-Machine Communications." In Algorithms, Methods, and Applications in Mobile Computing and Communications, 133–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5693-0.ch006.

Full text
Abstract:
This chapter proposes a new hybrid MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: contention interval (CI) and transmission interval (TI). The CI duration follows p-persistent CSMA mechanism, which allows M2M devices to contend for the transmission slots with equal priorities. After contention, only those devices which have won time-slots are allowed to transmit data packets during TI. In the proposed MAC scheme, the TI duration follows TDMA mechanism. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome various limitations of TDMA mechanism. The authors evaluate the performance of the proposed hybrid MAC protocol in terms of aggregate throughput, average transmission delay, channel utility, and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
8

Malik, H., E. Shakshuki, and M. Denko. "Intelligent Medium Access Control Protocol for WSN." In Encyclopedia of Mobile Computing and Commerce, 328–33. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch054.

Full text
Abstract:
This article reports an ongoing research that proposes an approach to the expansion of sensor-MAC (S-MAC), a cluster-based contention protocol to intelligent medium access control (I-MAC) protocol. I-MAC protocol is designed especially for wireless sensor networks (WSNs). A sensor network uses battery-operated computing and sensing devices. A network of these devices are used in many applications, such as agriculture and environmental monitoring.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Contention-based MAC protocols"

1

Gallardo, J. R., D. Makrakis, and H. T. Mouftah. "On Modeling Contention-Based MAC Protocols Using Markov Chains." In ICC 2010 - 2010 IEEE International Conference on Communications. IEEE, 2010. http://dx.doi.org/10.1109/icc.2010.5502486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Darus, Mohamad Yusof, Aisyah Kamarudin, Norkhushaini Awang, and Fakariah Hani Mohd Ali. "Analysis performance on contention-based MAC protocols in MANETs." In 2014 Fourth World Congress on Information and Communication Technologies (WICT). IEEE, 2014. http://dx.doi.org/10.1109/wict.2014.7077284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Banluta, Jenith L., Lilet D. Balbuena, Nestor Michael C. Tiglao, and Jhoanna Rhodette I. Pedrasa. "Comparison of contention-based MAC protocols for Underwater Sensor Networks." In 2017 International Conference on Information Networking (ICOIN). IEEE, 2017. http://dx.doi.org/10.1109/icoin.2017.7899548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Touil, Hicham, and Youssef Fakhri. "Energy-efficiency maximization mechanism for IEEE 802.11e contention-based MAC protocols." In 2014 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2014. http://dx.doi.org/10.1109/icmcs.2014.6911375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chand, Trilok, and Arvind Kakria. "Comparative analysis of a contention based (RI-MAC) and TDMA based (ATMA) MAC protocols for Wireless Sensor Networks." In 2015 IEEE Sensors. IEEE, 2015. http://dx.doi.org/10.1109/icsens.2015.7370623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Doudou, Messaoud, Djamel Djenouri, Nadjib Badache, and Abdelmadjid Bouabdallah. "Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks." In 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2012. http://dx.doi.org/10.1109/iscc.2012.6249332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Trista S., Hervé Rivano, and Frédéric Le Mouël. "Performance comparison of contention- and schedule-based mac protocols in urban parking sensor networks." In the 2014 ACM international workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2633661.2633663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bhuiyan, Mohammad Masumuzzaman, Iqbal Gondal, and Joarder Kamruzzaman. "Cross layer modeling of contention-based MAC and deterministic routing protocols in multi-hop WSNs." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kynsijarvi, Leena, Leonardo Goratti, Raffaello Tesi, Jari Iinatti, and Matti Hamalainen. "Design and performance of contention based MAC protocols in WBAN for medical ICT using IR-UWB." In 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops). IEEE, 2010. http://dx.doi.org/10.1109/pimrcw.2010.5670420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shanmugam, Kannan. "A Study on Sender Initiated Contention Based MAC Protocols without Reservation Mechanisms in Wireless Ad-Hoc Networks." In 2018 International Conference on Soft-computing and Network Security (ICSNS). IEEE, 2018. http://dx.doi.org/10.1109/icsns.2018.8573613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography