To see the other types of publications on this topic, follow the link: Control de acceso al medio (MAC).

Journal articles on the topic 'Control de acceso al medio (MAC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Control de acceso al medio (MAC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Guevara, Judy, Luis Fernando Pedraza Martínez, and César Augusto Hernández Suárez. "Evaluación de los protocolos MAC IEEE 802.11 y MMAC-CR en una red manet." Revista Tecnura 18 (December 1, 2014): 125. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2014.se1.a10.

Full text
Abstract:
Este artículo presenta un análisis comparativo entre los mecanismos de control de acceso al medio IEEE 802.11 y MMAC-CR (Multichannel MAC protocol for Cognitive Radio) en redes MANET (Mobile Ad Hoc Networks). El estándar IEEE 802.11 permite el uso de múltiples canales disponibles en la capa física, pero su protocolo MAC está diseñado para un solo canal. Sin embargo, un protocolo MAC de un solo canal no trabaja bien en un entorno multicanal debido al problema del terminal oculto. La metodología del artículo se basa en la descripción de los protocolos de control de acceso al medio, la simulación del throughput de estos, el análisis de los resultados y las conclusiones. Los resultados de simulación muestran cómo el protocolo MMAC-CR permite hacer un mejor uso de las oportunidades espectrales, incrementando de esta manera el throughput de la red MANET.
APA, Harvard, Vancouver, ISO, and other styles
2

Guevara, Judy C., Luis Fernando Pedraza, and Cesar Augusto Hernández Suárez. "Evolución del protocolo MAC multicanal para redes de radio cognitiva." Revista Tecnura 17, no. 36 (2013): 129. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2013.2.a10.

Full text
Abstract:
Este artículo presenta la evolución del protoco­lo MMAC-CR (Multichannel MAC protocol for Cognitive Radio). Para ello, se analizan las venta­jas que presenta y se estudian aquellas funciones de la radio cognitiva en las cuales el control de acceso al medio tiene una alta influencia, como la movilidad espectral, la detección de canal, la asignación de recursos y el acceso al espectro. También se describen las variaciones del proto­colo MMAC-CR de acuerdo con el mecanismo de negociación y reserva que cada una de ellas implementa.
APA, Harvard, Vancouver, ISO, and other styles
3

Gualdrón González, Óscar, and Ricardo Andrés Díaz Suárez. "Análisis de desempeño del IEEE802.11 para la conectividad de zonas rurales de Colombia." ITECKNE 9, no. 2 (2012): 7–21. http://dx.doi.org/10.15332/iteckne.v9i2.2753.

Full text
Abstract:
Dentro de este artículo se presenta las características de desempeño del estándar IEEE802.11 en enlaces punto a punto de largo alcance sobre emplazamientos rurales en Colombia. Para explicar este desempeño primero se realiza una descripción detallada del comportamiento de la capa física y MAC en el despliegue de redes de largo alcance, esto se realiza mediante análisis de la regulación existente para la máxima potencia isotrópica radiada equivalente en la banda ISM, las pérdidas por propagación, el nivel de recepción de los radios Wi-Fi comerciales, la tasa de error de frame y considerando como los parámetros DIFS, Slottime y ACKTimeout que hacen parte del control de acceso al medio e inciden en la implementación de radio enlaces de varios kilómetros. Posteriormente a partir de unos modelos teóricos presentes en la literatura y uno propuesto por los autores se calcula el throughput UDP saturado unidireccional y bidireccional en función de la distancia consideradas las diferentes velocidades de transmisión; después con un par de prototipos de comunicación Wi-Fi autónomos alimentados con energía fotovoltaica diseñados y construidos en laboratorio, se realizan un grupo de medidas experimentales de throughput UDP saturado en enlaces punto-punto entre Bucaramanga y emplazamientos rurales circundantes a su área metropolitana en el rango de distancias de 0-10.4km, las mediciones se realizaron con el generador de tráfico IPERF enviando paquetes UDP de forma unidireccional y bidireccional, posteriormente las mediciones realizadas se comparan con los obtenidos de forma teórica.
APA, Harvard, Vancouver, ISO, and other styles
4

Christopher U, EBELOGU, AMUJO Oluyemi E, ADELAIYE Oluwasegun I, and FAKI Ageebee S. "Media Access Control (MAC) Protocols: An Overview." International Journal of Advances in Scientific Research and Engineering 5, no. 8 (2019): 142–49. http://dx.doi.org/10.31695/ijasre.2019.33462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

EBELOGU, Christopher U. "Media Access Control (MAC) Protocols: An Overview." International Journal of Advances in Scientific Research and Engineering (ijasre) 5, no. 8 (2019): 142–49. https://doi.org/10.31695/IJASRE.2019.33462.

Full text
Abstract:
<em>Information Technology has grown rapidly leading to challenges with communicating information with nodes at remote locations. There are many communication media, </em><em>and certain varieties of wired links such as coaxial cables, where multiple nodes can all be linked to hear each other&#39;s transmissions either properly, correctly or with some non-zero probability. Generally, there are two rudimentary ways of sharing such stations or media, which can be the time-sharing, and frequency sharing. This paper tackles the rudimentary question of how such one common communication channel also called a shared medium can be distributed among the distinct nodes with maximum productivity. It analyzes wireless sensor networks and its accompanying technologies sighting their pros and cons. Focusing on time-sharing, we examine methodically two prevalent approaches used in obtaining this which are either by time division (split) multiple access (TDMA) or contention protocols of which both approaches are widely being used in today&rsquo;s systems. It also shows that with proper time of selecting the likelihood exigency of Tame Division Multiple Access&rsquo;s (TDMAs), utilization tends to 1/e (37%) but also tends to increase collision. To adapt the transmitted message likelihood,</em> a <em>format for calculation was adopted</em>. <em>The idea was to seek to gather to the favorable point of value. Slotted Aloha has twice the utilization of Unslotted-Aloha when the numbers of accumulated nodes grow. The Study also shows that each node will stake transmission within sprinkling fixed number of slots and this is guaranteed when using a related distribution in a finite window, but this is not the case with geometric distribution. </em>
APA, Harvard, Vancouver, ISO, and other styles
6

Radicelli García, Ciro Diego, and Narcis Cardona-Marcet. "Parámetros configurables de capa física y MAC de un nuevo estándar de TDT con canal de retorno inalámbrico para proporcionar conectividad a Internet en zonas rurales de Latinoamérica." DYNA 83, no. 198 (2016): 16. http://dx.doi.org/10.15446/dyna.v83n197.52242.

Full text
Abstract:
Este artículo propone una guía para la configuración de los parámetros de capa física y MAC de un nuevo estándar de televisión digital terrestre (TDT) de segunda generación con canal de retorno inalámbrico denominado DVB-RCT2, particularizando en la capa física; (i) los modos de transmisión, (ii) las estructuras de ráfagas (BS1, BS2, BS3), y (iii) los esquemas de acceso al medio (MAS) para diferentes tamaños de FFT; y en la capa MAC (i) los modos de acceso, considerando un ancho de banda de 6 MHz. Para obtener los datos de esta investigación se ha emulado las condiciones del canal RCT2 en un laboratorio de radiodifusión, donde se ha generado el flujo de transporte de RCT2, obteniendo valores sobre el funcionamiento tanto de capa física como de MAC, que están representados en tablas, constatando así las capacidades de DVB-RCT2 sobre DVBRCT, lo que lo convierte en una interesante alternativa para proporcionar acceso a Internet a zonas rurales.
APA, Harvard, Vancouver, ISO, and other styles
7

Radicelli García, Ciro Diego, and Narcis Cardona-Marcet. "Parámetros configurables de capa física y MAC de un nuevo estándar de TDT con canal de retorno inalámbrico para proporcionar conectividad a Internet en zonas rurales de Latinoamérica." DYNA 83, no. 198 (2016): 16–26. http://dx.doi.org/10.15446/dyna.v83n198.52242.

Full text
Abstract:
Este artículo propone una guía para la configuración de los parámetros de capa física y MAC de un nuevo estándar de televisión digital terrestre (TDT) de segunda generación con canal de retorno inalámbrico denominado DVB-RCT2, particularizando en la capa física; (i) los modos de transmisión, (ii) las estructuras de ráfagas (BS1, BS2, BS3), y (iii) los esquemas de acceso al medio (MAS) para diferentes tamaños de FFT; y en la capa MAC (i) los modos de acceso, considerando un ancho de banda de 6 MHz. Para obtener los datos de esta investigación se ha emulado las condiciones del canal RCT2 en un laboratorio de radiodifusión, donde se ha generado el flujo de transporte de RCT2, obteniendo valores sobre el funcionamiento tanto de capa física como de MAC, que están representados en tablas, constatando así las capacidades de DVB-RCT2 sobre DVBRCT, lo que lo convierte en una interesante alternativa para proporcionar acceso a Internet a zonas rurales.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Zhe Tao, Tingrui Pei, and Shu Yang. "Media Access Control Protocols in Multimedia Wireless Sensor Networks: A Survey." Advanced Materials Research 216 (March 2011): 768–72. http://dx.doi.org/10.4028/www.scientific.net/amr.216.768.

Full text
Abstract:
Multimedia wireless sensor networks (MWSN) have outstanding ability of acquiring and processing information. Media access control is a research hotspot in MWSN. Many MAC protocols with different objectives for wireless sensor networks have been proposed by researchers, however, few of them suit for MWSN. This article presented an overview of characteristics and challenges of MAC in MWSN. We firstly overviewed of the research effort; then we compared different protocols; finally we point out some possible directions of future research on MAC layer design.
APA, Harvard, Vancouver, ISO, and other styles
9

Zou, Zhe Guang, Xiao Mei Xu, Yi Tao, and Zhao Tong Zhu. "Joint Design of Ranging and Media Access Control in Underwater Acoustic Networks." Advanced Materials Research 546-547 (July 2012): 1261–69. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1261.

Full text
Abstract:
Due to the unique characteristics of underwater acoustic channels, most wireless protocols need necessary modifications before being applied to underwater acoustic networks. In order to match underwater environment better and achieve higher performance, underwater acoustic networks are calling for cross-layer design with integrated functions implementing. This paper discusses about how to integrate the ranging technique and media access control (MAC) together. Ranging plays a key role in forming a network topology. However, the independent ranging process in an underwater acoustic network requires frequently media access and affects the performance of MAC protocols. In this paper, a joint design of ranging and MAC was proposed to solve the problem. MAC signals are reused to estimate the range. By applying ranging solutions for Aloha and MACAW, good range estimation was obtained in underwater networks. An undersea experiment was carried out to verify this solution. The experimental results show that the joint design of ranging and MAC is capable to work well in underwater acoustic networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Guleria, Kalpna, Sushil Kumar, and Anil Kumar Verma. "Energy Efficient Synchronous Media Access Control for Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2523–30. http://dx.doi.org/10.1166/jctn.2020.8925.

Full text
Abstract:
The technological advancements have brought a revolution in the field of communication, especially in the area of wireless communication. It has made the deployment of WSNs possible which comprise of a large number of low-power and low-cost sensor nodes to perform the task of sensing, processing, and communication. WSNs set stringent requirements for network lifetime, resource constraint, application specific behavior and they are highly dynamic in nature. The one factor which affects the most is the network lifetime and it requires the energy efficient operation to be performed. This article aims at providing researchers a clear understanding and deep insight into the selection MAC protocols which is one of the major design factor while establishing WSNs or developing an energy efficient routing protocol for WSNs. The article presents a systematic review of various low duty cycle syncronous MAC protocols along with an in-depth analytical comparison and discussion based on various performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Hongyu, Huifang Chen, and Lei Xie. "SSH-MAC: Service-Aware and Scheduling-Based Media Access Control Protocol in Underwater Acoustic Sensor Network." Remote Sensing 16, no. 15 (2024): 2718. http://dx.doi.org/10.3390/rs16152718.

Full text
Abstract:
In the framework of the space-air-ground-ocean integrated network, the underwater acoustic sensor network (UASN) plays a pivotal role. The design of media access control (MAC) protocols is essential for the UASN to ensure efficient and reliable data transmission. From the perspective of differentiated services in the UASN, a service-aware and scheduling-based hybrid MAC protocol, named the SSH-MAC protocol, is proposed in this paper. In the SSH-MAC protocol, the centralized scheduling strategy is adopted by sensor nodes with environmental monitoring service, and the distributed scheduling strategy is adopted by sensor nodes with target detection service. Considering the time-varying data generation rate of sensor nodes, the sink node will switch the scheduling mode of sensor nodes based on the specific control packet and adjust the resource allocation ratio between centralized scheduling and distributed scheduling. Simulation results show that the performance of the SSH-MAC protocol, in terms of utilization, end-to-end delay, packet delivery ratio, energy consumption, and payload efficiency, is good.
APA, Harvard, Vancouver, ISO, and other styles
12

Hong, Sunghyuck, Jeff Baker, and Jaeki Song. "Secure Authentication in Group Communications Using Media Access Control (MAC) Address." Recent Patents on Computer Sciencee 3, no. 1 (2010): 14–19. http://dx.doi.org/10.2174/2213275911003010014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Fan, Guang-yu, Hui-fang Chen, Lei Xie, and Kuang Wang. "Funneling media access control (MAC) protocol for underwater acoustic sensor networks." Journal of Zhejiang University SCIENCE C 12, no. 11 (2011): 932–41. http://dx.doi.org/10.1631/jzus.c1000388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hong, Sunghyuck, Jeff Baker, and Jaeki Song. "Secure Authentication in Group Communications Using Media Access Control (MAC) Address." Recent Patents on Computer Science 3, no. 1 (2010): 14–19. http://dx.doi.org/10.2174/1874479611003010014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Radha, S., G. Josemin Bala, E. Grace Mary Kanaga, and P. Nagabushanam. "Scheduling and adaptive listening approaches in MAC for WSN applications: A survey." Journal of High Speed Networks 26, no. 4 (2020): 325–38. http://dx.doi.org/10.3233/jhs-200647.

Full text
Abstract:
False data detection, intrusion detection and coverage rate are major challenges in wireless sensor networks (WSN). Scheduling in media access control (MAC) using gateway and relay nodes solve some of the problems. In this paper, we carried out a brief survey on scheduling, delay aware MAC, cooperative communications in MAC, and adaptive listening to keep controlling the energy in sensors. In addition, multichannel MAC and various routing strategy techniques for WSN are discussed. Firefly algorithm for dynamic scheduling pipelined scheduling for linear sensor networks gives better throughput and latency. Heuristic configuration solves the overhearing problem, as node power-based MAC controls power of each node. Based on WSN applications and the performance metrics concentrated, various techniques for MAC are discussed throughout in this paper.
APA, Harvard, Vancouver, ISO, and other styles
16

Alocious, Chaminda, Hannan Xiao, Bruce Christianson, and Joseph Spring. "Embedding Trust in the Media Access Control Protocol for Wireless Networks." Sensors 25, no. 2 (2025): 354. https://doi.org/10.3390/s25020354.

Full text
Abstract:
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.11 have been designed under the assumption that all nodes in the network are cooperative and trustworthy. However, the potential for non-cooperative nodes exists, nodes that may purposefully misbehave in order to, for example, obtain extra bandwidth, conserve their resources, or disrupt network performance. This issue is further compounded when receivers such as Wi-Fi hotspots, normally trusted by other module nodes, also misbehave. Such issues, their detection, and mitigation have, we believe, not been sufficiently addressed in the literature. This research proposes a novel trust-incorporated MAC protocol (TMAC) which detects and mitigates complex node misbehavior for distributed network environments. TMAC introduces three main features into the original IEEE 802.11 protocol. First, each node assesses a trust level for their neighbors, establishing a verifiable backoff value generation mechanism with an incorporated trust model involving senders, receivers, and common neighbors. Second, TMAC uses a collaborative penalty scheme to penalize nodes that deviate from the IEEE 802.11 protocol. This feature removes the assumption of a trusted receiver. Third, a TMAC diagnosis mechanism is carried out for each distributed node periodically, to reassess neighbor status and to reclassify each based on their trust value. Simulation results in ns2 showed that TMAC is effective in diagnosing and starving selfish or misbehaving nodes in distributed wireless networks, improving the performance of trustworthy well-behaving nodes. The significant feature of TMAC is its ability to detect sender, receiver, and colluding node misbehavior at the MAC layer with a high level of accuracy, without the need to trust any of the communicating parties.
APA, Harvard, Vancouver, ISO, and other styles
17

Jiang, Lurong, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, and Jijun Tong. "Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism." Security and Communication Networks 2020 (November 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/6513920.

Full text
Abstract:
In wireless sensor networks, network security against virus propagation is one of the challenges with the applications. In severe cases, the network system may become paralyzed. In order to study the process of virus propagation in wireless sensor networks with the media access control mechanism, this paper uses the susceptible-infectious-removed (SIR) model to analyze the spreading process. It provides a theoretical basis for the development of virus immune mechanisms to solve network virus attack hidden dangers. The research shows that the media access control (MAC) mechanism in the wireless sensor network can inhibit the process of virus propagation, reduce the network virus propagating speed, and decrease the scale of infected nodes. The listen/sleep duty cycle of this mechanism will affect the suppression effect of virus propagation. The smaller the listen/sleep duty cycle, the stronger the suppression effect. Energy consumption has a peak value under specific infection probability. Meanwhile, it is also found that the spreading scale of the virus in wireless sensor networks can be effectively inhibited by the MAC mechanism.
APA, Harvard, Vancouver, ISO, and other styles
18

Zheng, Maochun, Wei Ge, Xiao Han, and Jingwei Yin. "A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks." Journal of Marine Science and Engineering 11, no. 4 (2023): 802. http://dx.doi.org/10.3390/jmse11040802.

Full text
Abstract:
The large propagation delay in underwater acoustic networks results in spatial and temporal uncertainty between communication links. This uncertainty, in turn, leads to problems with spatial unfairness and packet collision in media access control (MAC) solutions. To address these issues, this research paper proposes a spatially fair and low-conflict media access control (SFLC-MAC) protocol. Within the protocol, a contention window spatial fairness adjustment strategy is designed, including random and fair states. Nodes autonomously adjust their contention states based on the perceived network information. Nodes in the fair state increase their listening time to ensure that nodes in the random state can successfully access the channel, thereby overcoming the fairness issues in channel access. A method based on postponing data packet transmission is proposed to avoid collisions between data packets and neighbors’ control packets. By scrutinizing the spatio-temporal constraints pertinent to these conflicts, the exact duration of the delay required for this method is ascertained. Simulation results demonstrate that SFLC-MAC effectively improves network throughput, reduces end-to-end delay, decreases network energy consumption, and enhances channel access fairness among nodes.
APA, Harvard, Vancouver, ISO, and other styles
19

Jin, Zhigang, Shenyang Xiao, Yishan Su, and Yajing Li. "PC-MAC: A Prescheduling and Collision-Avoided MAC Protocol for Underwater Acoustic Sensor Networks." Journal of Sensors 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/4209301.

Full text
Abstract:
The impact of the acoustic modem with long preamble characteristic on the collision feature of the media access control scheme in underwater acoustic sensor networks (UANs) is evaluated. It is observed that the collision probability is relatively high due to the extremely long duration of preamble. As a result, UANs generally have much lower network throughput. To address this problem, a prescheduling MAC protocol named PC-MAC for UANs is proposed, which leverages a novel prescheduling scheme for the exchange of control packet to alleviate the collision probability among control packets. PC-MAC is a reservation-based channel access scheme. In the proposed protocol, an extra guard time is introduced to avoid the influence of dynamic spatial-temporal uncertainty of the sender and receiver positions. Simulation results show that PC-MAC outperforms classic reservation-based MAC protocol named SFAMA in terms of network goodput and end-to-end delay and lowers collision probability among control packets in two representative network scenarios.
APA, Harvard, Vancouver, ISO, and other styles
20

Guleria, Kalpna, Devendra Prasad, Umesh Kumar Lilhore, and Sarita Simaiya. "Asynchronous Media Access Control Protocols and Cross Layer Optimizations for Wireless Sensor Networks: An Energy Efficient Perspective." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2531–38. http://dx.doi.org/10.1166/jctn.2020.8926.

Full text
Abstract:
In the recent past, the wireless technology has grown at a very rapid pace and it has brought a revolution in the field of communication. WSNs are of great importance in building the smart devices and intelligent applications such as smart homes, military surveillance applications, target tracking and structural health monitoring etc. One of the major hardware limitations is limited energy of sensor nodes which has motivated researchers to emphasize on energy efficient communication and this in turn has given a lot of stimulus for the research of energy efficient protocols for MAC and network layer. Further, the cross-layer optimizations have a major impact on network performance metrics like increased energy efficiency, enhanced reliability, reduced delay and increased security as well. In this paper, various energy efficient asynchronous MAC, MIMO-MAC layer routing protocols, analysis, cross layer optimization have been discussed.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhou, Run, Bo Li, Mao Yang, and Zhongjiang Yan. "OFDMA Based QoS-Oriented Guarantee Novelty Multiple Access Protocol." Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University 36, no. 3 (2018): 543–49. http://dx.doi.org/10.1051/jnwpu/20183630543.

Full text
Abstract:
The next generation wireless local area network (WLAN) 802.11ax standards committee takes high quality of service(QoS) guarantee as one of important technology goals of the next generation WLAN. As a result of a variety of wireless traffics, so the requirements of the QoS must also be varied. However, the existing media access control(MAC) protocol based on orthogonal frequency division multiple access(OFDMA) can’t support QoS diversification and high requirement well. To solve this problem, this paper presents a QoS-oriented OFDMA MAC for the next generation WLAN. On one hand, for backward compatibility consideration, continue to use four priority traffics of 802.11e in this protocol; on the other hand, the introduction of QoS-oriented priority scheduling algorithm to support future wireless traffic feature which is QoS of diversification and high requirements. Finally, through the simulation, the system effective throughput of the proposed QoS-OFDMA MAC is 57.8% and 59% higher than the OFDMA MAC of the sequential scheduling algorithm and the OFDMA MAC of the proportional fairness algorithm.
APA, Harvard, Vancouver, ISO, and other styles
22

Sun, Shiqiang, Ning Sun, and Guangjie Han. "An Energy Efficient Transmission Mechanism based on Optimal Relay Distance for Underwater Acoustic Sensor Networks." Journal of Physics: Conference Series 2822, no. 1 (2024): 012068. http://dx.doi.org/10.1088/1742-6596/2822/1/012068.

Full text
Abstract:
Abstract Due to the limited resources and energy of communication in underwater acoustic sensor network (UASN), there are many challenges in designing energy-efficient and reliable media access control (MAC) protocols for UASN. This paper proposes an energy-efficient media access control (MAC) protocol with dynamic transmission range control (TRC), referred to as TRA-MAC. The protocol provides an adaptive, multi-hop and energy-saving solution for underwater sensor network communication. The protocol dynamically adjusts the transmission power of the node according to the distance between the source node and the destination node, and has the ability to adapt to network conditions. Simulation results show that compared with Slotted Aloha, the proposed adaptive relay node selection mechanism increases the energy efficiency by 43.07%, the network throughput by 46.6%, and the end-to-end delay is greatly reduced. Compared with Slotted FAMA, it has more significant advantages.
APA, Harvard, Vancouver, ISO, and other styles
23

Cheng, Ming Ce, and Ying Li. "Media Access Control Protocol in Ad Hoc Network Based on Hybrid Antennas." Advanced Materials Research 765-767 (September 2013): 1956–59. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1956.

Full text
Abstract:
In order to solve the problem of the communication asymmetry problems in hybrid ad hoc network because of the introduction of directional antennas, we propose a hybrid MAC protocol termed DFMAC protocol, which achieving data transmission by one hop through the use of exchange RTS by multiple hops. The protocol takes the benefit of directional antennas and can be used by node equipped with Omni-directional antennas, simulation results show that the DFMAC protocol performs well in improving the network throughput.
APA, Harvard, Vancouver, ISO, and other styles
24

TRUNG, T. M. "A Flow-Based Media Access Control (F-MAC) for Wireless Ad-Hoc Networks." IEICE Transactions on Communications E89-B, no. 3 (2006): 756–63. http://dx.doi.org/10.1093/ietcom/e89-b.3.756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Alexander Klein, Jirka Klaue, and Josef Schalk. "BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks." Electronic Journal of Structural Engineering, no. 01 (January 1, 2009): 35–45. http://dx.doi.org/10.56748/ejse.10801.

Full text
Abstract:
Many Media Access Control (MAC) protocols for Wireless Sensor Networks (WSN) use varia-tions of the popular Carrier Sense Multiple Access (CSMA) protocol due to its simplicity and its high perfor-mance in low traffic scenarios. However, CSMA does not always represent a good choice for WSNs since typical low power transceivers require a significant time to switch between receiving and transmitting and vice versa. Sensor nodes are not able to detect a busy channel during the switching. Thus, the collision proba-bility in WSNs is very high in case of correlated event-driven traffic. In this paper we introduce the BP-MAC protocol that uses a backoff preamble with variable length in order to mitigate the effect of Clear Channel As-sessment (CCA) delay.
APA, Harvard, Vancouver, ISO, and other styles
26

ÇIBUK, Musa, Davut ARI, Fikri AĞGÜN, and Ümit BUDAK. "TBL-MAC: A New Media Access Control Protocol Design for Linear Wireless Sensor Networks." Uluslararası Muhendislik Arastirma ve Gelistirme Dergisi 14, no. 2 (2022): 561–80. http://dx.doi.org/10.29137/umagd.1062421.

Full text
Abstract:
Son zamanlarda doğrusal topolojiye sahip Kablosuz Algılayıcı Ağ (KAA) uygulamalarının kullanımı gerçek dünyada oldukça popüler olmaya başlamıştır. Bu sebeple, bu alanda yapılan akademik çalışmaların sayısı gün geçtikçe artmaktadır. Otoyollar, köprüler, boru hatları ve sınır boylarının izlenmesi gibi uygulama alanına özel geliştirilen Doğrusal Kablosuz Algılayıcı Ağ (DKAA) uygulamalarına da sıkça rastlanmaktadır. KAA’ların özel bir türü olarak literatürde yerini almış olan DKAA’larda ağ yapısında düğümler sıralı olarak dizilmekte ve iletişim ortamı doğrusal düzende oluşturulmaktadır. Bu tür uygulamalar da haberleşmenin sağlanması için geliştirilmiş Ortam Erişim Kontrol (OEK) protokollerinin doğrusal dizilim karakteristiğine uygun olarak tasarlanması önem arz etmektedir. Çünkü ağdaki düğüm sayısı artıkça paketlerin uçtan uca gecikmesi ve koordinatör düğüme yakın olan düğümlerin veri trafiği çok yüksek seviyelere ulaşmaktadır. Doğrusal topolojilerde artan düğüm sayısı çarpışma ve sıkışıklık ihtimalini de artırmaktadır. Tüm bu sebeplerden dolayı doğrusal topolojiler için geliştirilen protokollerin gecikme duyarlı, sorunsuz bağlanabilen ve merkeze hatasız veri iletimi yapan karakteristiklere sahip olması beklenmektedir.&#x0D; Bu çalışmada, yukarıda bahsedilen DKAA problemlerini minimuma indirgemek üzere DKAA’lar için etkili, zor fiziksel şartlarda ağın bağlantı sürekliliğinin üstesinden gelen çevik bir OEK protokolü tasarlanmıştır. Makalemizde, üzerinde çalıştığımız protokolün odaklandığı ve önerdiği yeni çözümler irdelenerek anlatılmıştır. Yapılan çalışma ile Doğrusal Ağ Haberleşmesine katkı sunacak birçok yeniliğin literatüre kazandırılması hedeflenmiş, protokolün benzetimi yapılarak önerilerin geçerliliği test edilmiştir. Önerilmiş olan TBL-MAC protokolü uygulama sonuçları incelendiğinde, protokolün içerdiği yöntemlerin kabul göreceği ve çalışmanın araştırmacılara yeni bakış açıları kazandıracağı düşünülmektedir.
APA, Harvard, Vancouver, ISO, and other styles
27

Su, Yishan, Lijie Dong, and Qiuling Yang. "DCN-MAC: A Dynamic Channel Negotiation MAC Mechanism for Underwater Acoustic Sensor Networks." Sensors 20, no. 2 (2020): 406. http://dx.doi.org/10.3390/s20020406.

Full text
Abstract:
In the design of media access control (MAC) mechanism in underwater acoustic sensor networks (UASNs), due to the propagation characteristic of low-speed underwater acoustic signals, it is necessary to solve the spatial–temporal uncertainty problem. In order to avoid the multi-user access conflict in underwater networks, reduce the energy cost and improve the throughput and fairness across the network, a dynamic channel negotiation MAC mechanism based on spatial–temporal mapping of receiving queue (DCN-MAC) was proposed. DCN-MAC uses a duty cycle mechanism and implements a network management based on dynamic single node wake-up. The awakening node collects the request to send (RTS) and network status information in the network to solve the problem of space-temporal uncertainty and the highly dynamic needs of network access nodes and access services. The simulation results show that in different network scenarios, especially in those featuring high density and heavy network load, compared with the traditional underwater acoustic network MAC protocols, this protocol can effectively improve the network throughput and reduce the packet loss probability caused by multi-node conflict.
APA, Harvard, Vancouver, ISO, and other styles
28

Su, Yishan, Yongpeng Zuo, Zhigang Jin, and Xiaomei Fu. "OSPG-MAC: An OFDMA-Based Subcarrier Pregrouping MAC Protocol for Underwater Acoustic Wireless Sensor Networks." Journal of Sensors 2019 (June 16, 2019): 1–12. http://dx.doi.org/10.1155/2019/4965231.

Full text
Abstract:
In underwater acoustic wireless sensor networks (UAWSNs), designing media access control (MAC) protocols is highly challenging because of their significant influence on network performance. It is a great challenge to design suitable MAC protocols for UAWSNs because of the specific characteristics of underwater acoustic channels, such as low communication rates, large propagation delays, and limited available bandwidth. Orthogonal frequency division multiple access (OFDMA) is a special case of OFDM-based multicarrier modulation in which multiple user symbols are transmitted simultaneously using different subcarriers with overlapping orthogonal frequency bands. In this paper, we propose an OFDMA-based subcarrier pregrouping MAC protocol for UAWSNs, termed OSPG-MAC. To make it easier to allocate subcarriers and avoid conflict, we group all the subcarriers into fixed subchannels in advance and allocate them in terms of these subchannels. To maximize the total throughput on each subchannel, a bit and power allocation algorithm for the protocol is proposed, termed the OSPG-MAC algorithm. Simulation results show that the performance of OSPG-MAC is better than that of classic underwater MAC protocols, including SFAMA and T-Lohi.
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Youngsoo, Eun-Chan Park, and Chong-Ho Choi. "Signaling-Free Max-Min Airtime Fairness in IEEE 802.11 Ad Hoc Networks." Mobile Information Systems 2016 (2016): 1–19. http://dx.doi.org/10.1155/2016/9586893.

Full text
Abstract:
We propose a novel media access control (MAC) protocol, referred to assignaling-free max-min airtime fair(SMAF) MAC, to improve fairness and channel utilization in ad hoc networks based on IEEE 802.11 wireless local area networks (WLANs). We introducebusy time ratio(BTR) as a measure for max-min airtime fairness. Each node estimates its BTR and adjusts the transmission duration by means of frame aggregation and fragmentation, so that it can implicitly announce the BTR to neighbor nodes. Based on the announced BTR, each of the neighbor nodes controls its contention window. In this way, the SMAF MAC works in a distributed manner without the need to know the max-min fair share of airtime, and it does not require exchanging explicit control messages among nodes to attain fairness. Moreover, we successfully incorporate the hidden node detection and resolution mechanisms into the SMAF MAC to deal with the hidden node problem in ad hoc networks. The simulation results confirm that the SMAF MAC enhances airtime fairness without degrading channel utilization, and it effectively resolves several serious problems in ad hoc networks such as the starvation, performance anomaly, and hidden node problems.
APA, Harvard, Vancouver, ISO, and other styles
30

Hota, Lopamudra, Biraja Prasad Nayak, Arun Kumar, G. G. Md Nawaz Ali, and Peter Han Joo Chong. "An Analysis on Contemporary MAC Layer Protocols in Vehicular Networks: State-of-the-Art and Future Directions." Future Internet 13, no. 11 (2021): 287. http://dx.doi.org/10.3390/fi13110287.

Full text
Abstract:
Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely delivery of safety and non-safety messages is necessary for traffic congestion control and for avoiding road mishaps. For efficient resource sharing and optimized channel utilization, the media access control (MAC) protocol plays a vital role. An efficient MAC protocol design can provide fair channel access and can delay constraint safety message dissemination, improving road safety. This paper reviews the applications, characteristics, and challenges faced in the design of MAC protocols. A classification of the MAC protocol is presented based on contention mechanisms and channel access. The classification based on contention is oriented as contention-based, contention-free, and hybrid, whereas the classification based on channel access is categorized as distributed, centralized, cluster-based, cooperative, token-based, and random access. These are further sub-classified as single-channel and multi-channel, based on the type of channel resources they utilize. This paper gives an analysis of the objectives, mechanisms, advantages/disadvantages, and simulators used in specified protocols. Finally, the paper concludes with a discussion on the future scope and open challenges for improving the MAC protocol design.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Ruoyu, and Y. Rosa Zheng. "Channel utilization of media access control protocols for underwater acoustic networks with propagation delay and mobility." Journal of the Acoustical Society of America 155, no. 6 (2024): 3782–93. http://dx.doi.org/10.1121/10.0026232.

Full text
Abstract:
This paper investigates the impact of mobility on underwater acoustic communication networks in which the propagation delay is comparable to or larger than the packet duration. An underwater acoustic wireless network, consisting of static and mobile nodes, is studied for its link-layer channel utilization. Synchronous and asynchronous media access control (MAC) protocols are employed with ALOHA, TDMA (time-division multiple access), and artificial intelligence (AI) agent nodes. The simulation results of a multi-node network show that the asynchronous MAC protocols achieve up to 6.66× higher channel utilization than synchronous protocols by allowing time slots to be shorter than the maximum propagation delay among nodes and permitting asynchronous transmission time. The high mobility of a few mobile nodes also favors asynchronous protocols and increases the overall channel utilization. However, node mobility causes more difficulties for the AI node to learn the environment, which may be ineffective to achieve higher gains in channel utilization.
APA, Harvard, Vancouver, ISO, and other styles
32

Nguyen, VanDung, Tran Anh Khoa, Thant Zin Oo, Nguyen H. Tran, Choong Seon Hong, and Eui-Nam Huh. "Time Slot Utilization for Efficient Multi-Channel MAC Protocol in VANETs." Sensors 18, no. 9 (2018): 3028. http://dx.doi.org/10.3390/s18093028.

Full text
Abstract:
In vehicular ad hoc networks (VANETs), many schemes for a multi-channel media access control (MAC) protocol have been proposed to adapt to dynamically changing vehicle traffic conditions and deliver both safety and non-safety packets. One such scheme is to employ both time-division multiple access (TDMA) and carrier-sense multiple access (CSMA) schemes (called a hybrid TDMA/CSMA scheme) in the control channel (CCH) interval. The scheme can adjust the length of the TDMA period depending on traffic conditions. In this paper, we propose a modified packet transmitted in the TDMA period to reduce transmission overhead under a hybrid TDMA/CSMA multi-channel MAC protocol. Simulation results show that a MAC protocol with a modified packet supports an efficient packet delivery ratio of control packets in the CCH. In addition, we analyze the hybrid TDMA/CSMA multi-channel MAC protocol with the modified packet under saturated throughput conditions on the service channels (SCHs). The analysis results show that the number of neighbors has little effect on the establishment of the number of time slots in TDMA periods and on SCHs under saturated throughput conditions.
APA, Harvard, Vancouver, ISO, and other styles
33

Jo, Yun-Hyun, In-Seop Yoon, Sang-Uk Kim, and Hyo-Dal Park. "A Study on the MAC(Media Access Control) protocol for Unmanned Aerial Vehicle(UAV)." Journal of the Korea institute of electronic communication sciences 11, no. 1 (2016): 119–24. http://dx.doi.org/10.13067/jkiecs.2016.11.1.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yao, Kaifeng. "Research on Multiple Access Algorithms for Wireless Network." Journal of Electronic Research and Application 8, no. 4 (2024): 55–63. http://dx.doi.org/10.26689/jera.v8i4.7076.

Full text
Abstract:
Nodes in the communication network mainly depend on the Media Access Control (MAC) layer protocol design. To ensure the MAC protocol achieves high throughput, low latency, and high service quality, this paper designed a “centralized-distribution” system MAC protocol combined with a slot allocation algorithm. This allows it to quickly adapt to the topology changes in the network and the overall network frame structure. For the centralized time slot allocation, since the system’s frame structure changes across the entire network, the root node must gather information from other nodes. This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation. The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure. It enables adaptive changes in node transmission times, ensures the rapid transmission and circulation of large-capacity data between nodes, and improves transmission efficiency.
APA, Harvard, Vancouver, ISO, and other styles
35

Alshehri, Aziz, Faisal Shaman, Mohammad Rashid Hussain, et al. "Performance Enhancement of Cross-Layer Cognitive Media Access Control Protocol for Wireless Sensing Networks Using Hybrid Intelligent Optimization Approach." Journal of Nanoelectronics and Optoelectronics 18, no. 11 (2023): 1374–83. http://dx.doi.org/10.1166/jno.2023.3527.

Full text
Abstract:
In recent times, wireless sensing networks (WSNs) application usage is increased in a great way. Access to the communication channel is handled by the Medium Access Control (MAC) layer. At the MAC, a control channel is utilized to determine collision-free data transport pathways. As a result, with cognitive radio (CR) technology, the control channel architecture is critical to obtaining mandatory quality of Service (QoS). However, latency, network communication delay, and energy consumption are the main problem. In this article, a novel African Buffalo allied Jellfish Optimization (AFJO) is proposed for clustering and optimal Cluster Head (CH) selection. The hybrid intelligence method uses a unique probabilistic assessment rule purpose as a fitness role to find the best data transmission path while avoiding congestion, which is named as Fuzzy Interfaced Red Deer (FIRD). The proposed protocol’s performance is evaluated using Network Simulator (NS2), which takes into account parameters such as energy consumption, computational complexity, and Quality of Service (QoS) performance with radio frequency integrated parameters. The suggested technique decreases energy consumption, end-to-end latency, communication overhead, and maximizes network throughput when compared to state-of-the-art cross layer cognitive mac protocol for WSNs system approaches.
APA, Harvard, Vancouver, ISO, and other styles
36

Zheng, Linfeng, Juncheng Hu, and Yingjun Jiao. "A Cross-Layer Media Access Control Protocol for WBANs." Sustainability 15, no. 14 (2023): 11381. http://dx.doi.org/10.3390/su151411381.

Full text
Abstract:
Wireless body area network (WBAN) is an emerging comprehensive technology that can deeply integrate with e-health and smart sports. As a wearable network, improving the quality of network service and user experience is crucial. Due to the miniaturized design of sensors, their available energy from batteries is limited, making the extension of their lifetime a key research challenge. Existing studies have proposed methods to improve energy efficiency, but there are still limitations in addressing dynamic adaptive aspects of differential energy distribution and channel conditions. In order to further extend the lifetime of sensor nodes and networks while ensuring quality of service, and to provide a reliable transmission mechanism for heterogeneous application data, this paper presents a cross-layer optimized MAC protocol mechanism. The protocol takes into account the transmission requirements of different types of data and redesigns the superframe. To improve the lifetime of nodes, we propose an energy-adaptive adjustment mechanism considering the channel conditions. At the same time, a cooperative transmission mechanism is proposed to further enhance network lifetime. In experiments conducted on two typical networks, compared to IEEE 802.15.6, the power adjustment scheme improves the network lifetime by 2.8 to 3.7 times, and the cooperative mechanism between nodes further increases the network lifetime by 17% to 44%. Our proposed scheme effectively extends the network lifetime while ensuring quality of service, avoiding frequent battery resets for users, and effectively improving the user experience quality.
APA, Harvard, Vancouver, ISO, and other styles
37

ANDO, Ryoma, Ryo HAMAMOTO, Hiroyasu OBATA, Chisa TAKANO, and Kenji ISHIDA. "A Priority Control Method for Media Access Control Method SP-MAC to Improve Throughput of Bidirectional Flows." IEICE Transactions on Information and Systems E100.D, no. 5 (2017): 984–93. http://dx.doi.org/10.1587/transinf.2016ntp0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Song, Taewon, and Taeyoon Kim. "Performance Analysis of Synchronous Multi-Radio Multi-Link MAC Protocols in IEEE 802.11be Extremely High Throughput WLANs." Applied Sciences 11, no. 1 (2020): 317. http://dx.doi.org/10.3390/app11010317.

Full text
Abstract:
The representative media access control (MAC) mechanism of IEEE 802.11 is a distributed coordination function (DCF), which operates based on carrier-sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff. The next amendment of IEEE 802.11 being developed for future Wi-Fi by the task group-be is called IEEE 802.11be, where the multi-link operation is mainly discussed when it comes to MAC layer operation. The multi-link operation discussed in IEEE 802.11be allows multi-link devices to establish multiple links and operate them simultaneously. Since the medium access on a link may affect the other links, and the conventional MAC mechanism has just taken account of a single link, the DCF should be used after careful consideration for multi-link operation. In this paper, we summarize the DCFs being reviewed to support the multi-radio multi-link operation in IEEE 802.11be and analyze their performance using the Markov chain model. Throughout the extensive performance evaluation, we summarize each MAC protocol’s pros and cons and discuss essential findings of the candidate MAC protocols.
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Muhammad Asghar, Tanweer Ahmad Cheema, Insaf Ullah, et al. "A Dual-Mode Medium Access Control Mechanism for UAV-Enabled Intelligent Transportation System." Mobile Information Systems 2021 (February 15, 2021): 1–13. http://dx.doi.org/10.1155/2021/5578490.

Full text
Abstract:
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new landscape requires a stable, flexible, and business-friendly base of connectivity, networking, and computing technology, in which Unmanned Aerial Vehicles (UAVs) can play an important role. A UAV-enabled Intelligent Transportation System (ITS) can provide a cost-effective communication solution to improve the safety and efficiency of the transportation system, particularly if the data traffic is nonhomogeneous and nonstationary. Typically, wireless is the communication medium between vehicles and UAVs in an ITS setting, which is based on the IEEE802.11p MAC protocol adopted by car manufactures. However, the IEEE 802.11p MAC protocol is modified solely for omnidirectional antennas, which restricts network coverage, delay, and throughput. In comparison, the directional antenna has greater network coverage, spatial reuse, and bandwidth. In addition, a multiaccess edge computing (MEC) facility at the backhaul link will provide ultralow latency and high bandwidth services to meet the increasingly growing demand for latency-sensitive vehicle applications such as vehicular video data analytics, autonomous driving, and intelligent navigation. Therefore, this article aims to propose a novel dual-mode MAC protocol that can work in two antenna modes, i.e., directional and omnidirectional. For modeling and simulation purposes, we use the Optimized Network Engineering Tool (OPNET) and aim to seek an evaluation with respect to throughput, media access delay, and retransmission attempts. The results obtained demonstrate the effectiveness of the proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
40

Determe, Jean-François, Sophia Azzagnuni, François Horlin, and Philippe De Doncker. "MAC Address Anonymization for Crowd Counting." Algorithms 15, no. 5 (2022): 135. http://dx.doi.org/10.3390/a15050135.

Full text
Abstract:
Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then extracting and anonymizing their media access control (MAC) addresses using a hash-based approach. This paper discusses an anonymization procedure and shows time-synchronization inaccuracies among sensors and hashing collision rates to be low enough to prevent anonymization from interfering with counting algorithms. In particular, we derive an approximation of the collision rate of uniformly distributed identifiers, with analytical error bounds.
APA, Harvard, Vancouver, ISO, and other styles
41

Mwakwata, Collins Burton, Hassan Malik, Muhammad Mahtab Alam, Yannick Le Moullec, Sven Parand, and Shahid Mumtaz. "Narrowband Internet of Things (NB-IoT): From Physical (PHY) and Media Access Control (MAC) Layers Perspectives." Sensors 19, no. 11 (2019): 2613. http://dx.doi.org/10.3390/s19112613.

Full text
Abstract:
Narrowband internet of things (NB-IoT) is a recent cellular radio access technology based on Long-Term Evolution (LTE) introduced by Third-Generation Partnership Project (3GPP) for Low-Power Wide-Area Networks (LPWAN). The main aim of NB-IoT is to support massive machine-type communication (mMTC) and enable low-power, low-cost, and low-data-rate communication. NB-IoT is based on LTE design with some changes to meet the mMTC requirements. For example, in the physical (PHY) layer only single-antenna and low-order modulations are supported, and in the Medium Access Control (MAC) layers only one physical resource block is allocated for resource scheduling. The aim of this survey is to provide a comprehensive overview of the design changes brought in the NB-IoT standardization along with the detailed research developments from the perspectives of Physical and MAC layers. The survey also includes an overview of Evolved Packet Core (EPC) changes to support the Service Capability Exposure Function (SCEF) to manage both IP and non-IP data packets through Control Plane (CP) and User Plane (UP), the possible deployment scenarios of NB-IoT in future Heterogeneous Wireless Networks (HetNet). Finally, existing and emerging research challenges in this direction are presented to motivate future research activities.
APA, Harvard, Vancouver, ISO, and other styles
42

Ouyang, Yiming, Yang Zhao, Kun Xing, Zhengfeng Huang, Huaguo Liang, and Jianhua Li. "Design of Wireless Network on Chip with Priority-Based MAC." Journal of Circuits, Systems and Computers 28, no. 08 (2019): 1950124. http://dx.doi.org/10.1142/s021812661950124x.

Full text
Abstract:
The wireless network on chip WiNoC introduces wireless links in the traditional network on chip (NoC), which reduces the network diameter and enables high-throughput, low-latency data communications. In addition, if wireless nodes can dynamically request data transmission, wireless bandwidth will be more effectively utilized. In order to implement a conflict-free, adaptive bandwidth allocation strategy, a priority-based dynamic media access control mechanism has been designed. In this work, a dynamic priority calculation method has been proposed based on the packets’ transmission time and the waiting time in the queue. Then, a priority calculating unit is designed to calculate the dynamic priority of the packet. Finally, the central control unit designed obtains the dynamic priority of the packets, and dynamically authorizes the use rights of the wireless medium according to the priority of the data packet. Simulation experiments show that the media access control mechanism proposed in this paper has significant improvements in throughput, delay, and power consumption performances compared with other mechanisms [S.Deb et al., Wireless NoC as interconnection backbone for multicore chips: promises and challenges, IEEE J. Emerg. Sel. Topics Circuits Syst. 2 (2012) 228–239].
APA, Harvard, Vancouver, ISO, and other styles
43

Rahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.

Full text
Abstract:
Wireless networks have become essential to our daily lives, providing connectivity for a wide range of devices. However, with the increasing use of wireless networks, security has become a major concern. Media Access Control (MAC) address flooding, Dynamic Host Configuration Protocol (DHCP) spoofing, and rogue Secure Shell (SSH) are some of the most common security threats in wireless networks. These attacks can cause loss of confidentiality, integrity, and availability of network resources. In this study, vulnerabilities and challenges related to MAC address flooding, DHCP spoofing, and rogue SSH attacks were investigated. Analysis of the solution to prevent and mitigate these attacks was performed by network simulation using the Cisco Packet Tracer Windows version 8.1.1. The system design would provide a user-friendly interface for network administrators to monitor their networks and check for anomalies. The analysis indicated that Port Security effectively limited unauthorized MAC addresses, DHCP snooping successfully blocked illegitimate DHCP responses, and Access Control Lists restricted rogue SSH access, supporting these methods as optimal solutions for mitigating the respective security threats.
APA, Harvard, Vancouver, ISO, and other styles
44

Siddiqui, Shama, Anwar Ahmed Khan, and Sayeed Ghani. "A roadmap to developing energy-efficient MAC protocol in wireless sensor networks: a case of ADP-MAC development and implementation." Mehran University Research Journal of Engineering and Technology 42, no. 1 (2023): 137. http://dx.doi.org/10.22581/muet1982.2301.13.

Full text
Abstract:
Over the past two decades, hundreds of protocols have been developed for diversified applications of WSN corresponding to different layers in the communication stack. Among these, Media Access Control (MAC) layer protocols are of great interest due to providing possibility of optimizing performance parameters. Despite availability of a large number of survey articles, there remains a gap for a tutorial that offers guidelines about the development process of MAC protocol. In this paper, we present a detailed tutorial for developing a MAC protocol starting from the stage of research gap identification and ending at the performance evaluation. We described the journey of development and implementation of a novel asynchronous MAC protocol ADP-MAC (Adaptive and Dynamic Polling MAC) as a case study. ADP-MAC was developed by deploying a novel concept of channel polling interval distributions, and was compared against Synchronized Channel Polling- MAC (SCP-MAC) and lightweight Traffic Auto-Adaptation based MAC (T-AAD). Finally, we proposed major milestones of protocol development along with recommendations about publishing the research.
APA, Harvard, Vancouver, ISO, and other styles
45

Shial, Rabindra Kumar, Premanshu Rath, Sudhir Ranjan Patnaik, Sarat Chandra Nayak, and Umashankar Ghugar. "ANTMAC: Addressing Novel Congestion Technique Hybrid Model for Collision Control in IoT-based Environments using Contention-based MAC Protocol." International Journal of Computer Network and Information Security 16, no. 6 (2024): 45–55. https://doi.org/10.5815/ijcnis.2024.06.04.

Full text
Abstract:
In the communication model of the OSI layer, the Media access control (MAC) layer has been given higher priority than other layers. It is a sub-layer of the data link layer, mainly controlling the physical equipment and interacting with the channels over the Internet of Things (IoT) sensor nodes. Mac layers have used two protocol types: contention-based and contention-free during transmission. These two protocols have controlled the physical equipment and data transmission for the last decade. Yet in the MAC layers transmission, some challenging issues are complicated to resolve. Data collisions are the significant changing issues at the MAC layer. As per the survey of researchers, the contention-based protocol is more affected by collision due to allowing the sharing of channels to all nodes over networks. As a result, it has got message delay, demanding more energy, data loss, and retransmission. The researcher always focuses on reducing collision during transmission to overcome these issues. They mainly evaluate the priority-based collision control using the contention-based protocol. In this ANTMAC model, we have considered the lower energy nodes’ priority to enhance the likelihood that a node will gain access to the transmission channel before its power and batteries run out. Our recommended method ANTMAC outperforms ECM-MAC in terms of content retrieval time (CRT), total no of retransmission (TNR), total energy consumption (TEcm), throughput and network lifetime (NLT).
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Wan-Liang, Chao-Chao Wang, and Xin-Wei Yao. "Slot Self-Allocation Based MAC Protocol for Energy Harvesting Nano-Networks." Sensors 19, no. 21 (2019): 4646. http://dx.doi.org/10.3390/s19214646.

Full text
Abstract:
Nano-networks are composed of interconnected nano-nodes and can enable unprecedented applications in various fields. Due to the peculiarities of nano-networks, such as high density, extremely limited energy and computational resources, traditional carrier-sensing based Media Access Control (MAC) protocols are not suitable for nano-networks. In this paper, a Slot Self-Allocation based MAC protocol (SSA-MAC) is proposed for energy harvesting nano-networks. Two transmission schemes for centralized and distributed nano-networks are designed, respectively. In centralized nano-networks, nano-nodes can only send packets to the nano-controller in their Self-Allocation Slots (SASs), while, in distributed nano-networks, nano-nodes can only receive packets from surrounding nano-nodes in their SASs. Extensive simulations were conducted to compare the proposed SSA-MAC with PHysical LAyer aware MAC (PHLAME), Receiver-Initiated Harvesting-aware MAC (RIH-MAC) and Energy Efficient Wireless NanoSensor Network MAC (EEWNSN). From the results, it can be concluded that the proposed SSA-MAC achieves better performance and can reduce the collision probability, while improving the energy efficiency of nano-networks.
APA, Harvard, Vancouver, ISO, and other styles
47

Shalu, Chauhan, Tripathi Ankit, and Anand Vartika. "A STUDY ON THE MAC TECHNOLOGY AND ACCESS NETWORK OVER 3G SYSTEMS." International Journal on Cybernetics & Informatics (IJCI) 6, no. 1/2 (2017): 77–82. https://doi.org/10.5121/ijci.2017.6210.

Full text
Abstract:
Access network architecture and media access control technique are the requirements of beyond 3G mobile communication systems for B3G systems [1]. The proposed novel access network architecture is that the network complexity is minimized and maximizes system performance. The Centralized mini-slot packet reservation multiple access (CMPRMA based on OFDMA is proposed which not only can acquire the advantages or good assets of MPRMA and support or guide Real-time traffic in well manner but can also give the resource reservation scheme for data traffic and support transmission for data traffic efficiently.
APA, Harvard, Vancouver, ISO, and other styles
48

Meng, W., I. Habib, and T. N. Saadawi. "S++‐GA: a high performance MAC protocol." Journal of High Speed Networks 6, no. 4 (1997): 293–307. https://doi.org/10.3233/hsn-1997-134.

Full text
Abstract:
A media access control (MAC) protocol supporting Slot Reuse for improving the performance of S++ networks, called group addressing simple double plus and denoted by S++‐GA, is presented. S++‐GA obtains higher performance than S++ via a four‐fold approach: (1) Dividing all the nodes in S++‐GA into multiple groups and assigning each group a group code. (2) Establishing a post‐destination group slot release rule that releases a busy slot after the busy slot departs from its destination group. (3) Introducing a modified transmission rule, named group transmission rule. (4) Modifying cyclic bandwidth‐allocation rule of S++. In contrast to S++ with Destination Release (DR) (S++‐DR) or with Erasure Nodes (EN) (S++‐EN), S++‐GA buffers only partial node‐address for slot release but not the whole node‐address or the whole slot. So, the system latency and access delay of S++‐GA are less than those of S++‐DR and S++‐EN.
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Xin, Xiujuan Du, Meiju Li, Lijuan Wang, and Chong Li. "A MAC Protocol of Concurrent Scheduling Based on Spatial-Temporal Uncertainty for Underwater Sensor Networks." Journal of Sensors 2021 (March 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/5558078.

Full text
Abstract:
Underwater sensor networks (UWSNs) are characterized by large energy consumption, limited power supply, low bit rate, and long propagation delay, as well as spatial-temporal uncertainty, which present both challenges and opportunities for media access control (MAC) protocol design. The time-division transmissions can effectively avoid collisions since different nodes transmit packets at different period of time. Nevertheless, in UWSNs with long propagation delay, in order to avoid collisions, the period of time is subject to be long enough, which results in poor channel utilization and low throughput. In view of the long and different propagation delay between a receiving node and multiple sending nodes in UWSNs, as long as there is no collision at the receiving node, multiple sending nodes can transmit packets simultaneously. Therefore, in this paper, we propose a MAC protocol of concurrent scheduling based on spatial-temporal uncertainty called CSSTU-MAC (concurrent scheduling based on spatial-temporal uncertainty MAC) for UWSNs. The CSSTU-MAC protocol utilizes the characteristics of temporal-spatial uncertainty as well as long propagation delay in UWSNs to achieve concurrent transmission and collision avoidance. Simulation results show that the CSSTU-MAC protocol outperforms the existing MAC protocol with time-division transmissions in terms of average energy consumption and network throughput.
APA, Harvard, Vancouver, ISO, and other styles
50

Tran, Khoa Thi Minh, and Seung Hyun Oh. "A Cooperative MAC Scheduling Scheme for Underwater Sensor Networks." Applied Mechanics and Materials 295-298 (February 2013): 903–8. http://dx.doi.org/10.4028/www.scientific.net/amm.295-298.903.

Full text
Abstract:
The long propagation delay in underwater acoustic sensor networks renders existing media access control (MAC) protocols for terrestrial wireless networks undesirable. In this paper, we propose a new cooperative MAC protocol for underwater sensor networks that is used to detect objects and monitoring the environment. Our proposed MAC protocol tries to prevent data collisions through short term scheduling among neighbor nodes with exchange of short data message. By adapting the all sensor nodes to the transmitting schedules in which time is optimized we can minimize the collision rate between nodes. Through simulations, we show our proposed protocol can minimize data collisions and not only offers a higher throughput, but also indicates a better end-to-end delay.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!