КЛАСИФІКАЦІЯ ПРОТОКОЛІВ МАС РІВНЯ ДЛЯ AD-HOC МЕРЕЖ
Анотація
Classifications of MAC protocols for Ad-Hoc networks
Due to technological advances for ad-hoc networks created many Medium Access Control (MAC) layer protocols. In this paper, we classify these protocols. Five key features emerging: contention-based protocols, with reservation, with scheduling, with routing management, with power and directions management. Also, our classification focuses categorizing protocols which resolve hidden and exposed terminal problem.Посилання
R. Jurdak, C. V. Lopes. A survey, classification and comparative analysis of medium access control protocols for ad hoc networks// IEEE Communications, 2004, volume 6, no. 1.
O. Bazan, M. Jaseemuddin. A Survey On MAC Protocols for Wireless Adhoc Networks with Beamforming Antennas // IEEE COMMUNICATIONS SURVEYS, 10 January 2011.
L. Boroumand, R. H. Khokhar, L. A. Bakhtiar. A Review of Techniques to Resolve the Hidden Node Problem in Wireless Networks// Smart Computing Review, vol. 2, no. 2, April 2012.
MAC Protocols for Ad Hoc and Sensor Networks// Computer and Communication Systems, [WSN] Winter 2011/2012.
D. A. Moltchanov. MAC protocols// TUT, 2011.
C. Prakash. Ad Hoc Wireless Media Access Protocols// Lovely Professional University, Punjab 2013
J. P. Sheu. MAC Protocols for Ad Hoc Wireless Networks// 2014
А.П. Войтер. Media Access Control-уровень сверхширокополосных импульсных радиосетей// УСиМ, 2014, № 3.
##submission.downloads##
Опубліковано
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2016 Володимир Васильович Максимов, Олександр Олександрович Литвин
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.