Wireless medium access control protocols
ACV Gummalla, JO Limb - IEEE Communications Surveys & …, 2000 - ieeexplore.ieee.org
Technological advances, coupled with the flexibility and mobility of wireless systems, are the
driving force behind the Anyone, Anywhere, Anytime paradigm of networking. At the same …
driving force behind the Anyone, Anywhere, Anytime paradigm of networking. At the same …
PAMAS—power aware multi-access protocol with signalling for ad hoc networks
In this paper we develop a new multiaccess protocol for ad hoc radio networks. The protocol
is based on the original MACA protocol with the adition of a separate signalling channel …
is based on the original MACA protocol with the adition of a separate signalling channel …
[BOOK][B] Ad hoc mobile wireless networks: principles, protocols and applications
SK Sarkar, TG Basavaraju, C Puttamadappa - 2007 - taylorfrancis.com
Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines
because they can be deployed with simple infrastructures and virtually no central …
because they can be deployed with simple infrastructures and virtually no central …
How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks
K Xu, M Gerla, S Bae - Global Telecommunications Conference …, 2002 - ieeexplore.ieee.org
IEEE 802.11 MAC mainly relies on two techniques to combat interference: physical carrier
sensing and RTS/CTS handshake (also known as" virtual carrier sensing"). Ideally, the …
sensing and RTS/CTS handshake (also known as" virtual carrier sensing"). Ideally, the …
Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks
In ad hoc networks, the hidden-and the exposed-terminal problems can severely reduce the
network capacity on the MAC layer. To address these problems, the ready-to-send and clear …
network capacity on the MAC layer. To address these problems, the ready-to-send and clear …
Medium access control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for
various new applications. In these networks, the Medium Access Control (MAC) protocols …
various new applications. In these networks, the Medium Access Control (MAC) protocols …
Real-time communication and coordination in embedded sensor networks
Sensor networks can be considered distributed computing platforms with many severe
constraints, including limited CPU speed, memory size, power, and bandwidth. Individual …
constraints, including limited CPU speed, memory size, power, and bandwidth. Individual …
[BOOK][B] Handbook of wireless networks and mobile computing
I Stojmenovic - 2002 - Wiley Online Library
The past five decades have witnessed startling advances in computing and communication
technologies that were stimulated by the availability of faster, more reliable, and cheaper …
technologies that were stimulated by the availability of faster, more reliable, and cheaper …
Infotainment and road safety service support in vehicular networking: From a communication perspective
Vehicular ad hoc networking is an emerging technology for future on-the-road
communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure …
communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure …
What is the right model for wireless channel interference?
In a wireline network, nodes form links with only those nodes they are wired to, and the links
do not interfere with one another. In contrast, in a wireless network, signal transmissions are …
do not interfere with one another. In contrast, in a wireless network, signal transmissions are …