Academia.eduAcademia.edu

MAC Layer

description3,483 papers
group112 followers
lightbulbAbout this topic
The Medium Access Control (MAC) layer is a sublayer of the data link layer in the OSI model, responsible for managing protocol access to the physical transmission medium. It controls how devices on a network uniquely identify themselves and share the communication channel, ensuring efficient data transmission and minimizing collisions.
lightbulbAbout this topic
The Medium Access Control (MAC) layer is a sublayer of the data link layer in the OSI model, responsible for managing protocol access to the physical transmission medium. It controls how devices on a network uniquely identify themselves and share the communication channel, ensuring efficient data transmission and minimizing collisions.

Key research themes

1. How do MAC layer protocols optimize medium access for diverse IoT and wireless network environments?

This research theme explores the design and evaluation of MAC layer protocols tailored for Internet of Things (IoT) and wireless sensor networks (WSNs), focusing on how protocol characteristics such as energy efficiency, scalability, coverage range, data rate, and transmission mechanisms are optimized to suit various application requirements. Understanding these protocols is crucial given the heterogeneity and resource constraints of IoT devices and WSNs, affecting network lifetime, throughput, and reliability.

Key finding: This paper provides a comprehensive classification and comparative study of MAC protocols for both short-range (WPAN) and long-range (WAN and LP-WAN) IoT applications, highlighting how protocols like IEEE 802.15.4, Bluetooth... Read more
Key finding: This study quantifies how transmission power control (TPC) impacts the MAC layer energy consumption in self-organized wireless sensor networks using IEEE 802.15.4 standard-compliant nodes with CC2420 transceivers. Simulation... Read more
Key finding: By analyzing the performance degradation caused by various jamming attacks targeting the MAC layer (specifically S-MAC protocol) in wireless sensor networks within IoT, this paper quantifies increased packet loss rates and... Read more
Key finding: Through NS2 simulation, the paper shows that integrating reverse direction transmission and block acknowledgment strategies at the MAC layer in IEEE 802.11n substantially reduces overhead and enhances system throughput for... Read more
Key finding: This work proposes a priority-aware backoff algorithm at the MAC layer for wireless sensor networks that significantly improves channel acquisition fairness and reliability by introducing priority-based contention windows.... Read more

2. How can cross-layer designs and integration improve MAC layer performance and adaptability in wireless and cognitive radio networks?

This theme investigates the use of cross-layer strategies that leverage information exchange between the MAC layer and other protocol layers (notably the physical layer) to optimize wireless network performance. Such integration allows for dynamic adaptations in power control, collision avoidance, and transmission scheduling, which are crucial in environments with fluctuating channel conditions and variable traffic demands, including cognitive radio and MANET contexts.

Key finding: The paper presents a novel MAC protocol for cognitive radio networks that integrates physical layer information such as SINR and received power into a knowledge-based reasoning engine to dynamically adjust transmission power... Read more
Key finding: This study introduces a distributed queuing MAC scheme (DQCA) that employs cross-layer interactions with the physical layer for WLANs, eliminating backoff periods and collisions typical of legacy 802.11 MAC protocols.... Read more
Key finding: The paper advances a network utility maximization (NUM) based cross-layer design optimizing MAC medium access probabilities jointly with transport layer session rates in MANETs, incorporating realistic constraints like... Read more
Key finding: Proposing a QoS-enabled Medium-Transparent MAC protocol for dense Analog-Radio-over-Fiber 5G disaggregated RAN architectures, the paper addresses simultaneous arbitration of optical and wireless medium resources. The protocol... Read more

3. What are the performance trade-offs and comparative insights between MAC layer protocols in vehicular networks and V2X communications?

Focusing on Vehicular Ad Hoc Networks (VANETs) and Vehicle-to-Everything (V2X) systems, this theme explores how specialized MAC protocols meet the stringent requirements of high mobility, low latency, and safety-critical message dissemination. Comparative analyses between contention-based, contention-free, and hybrid MAC mechanisms, as well as the contrast between IEEE 802.11p (ITS-G5) and Cellular-V2X (C-V2X), reveal trade-offs influencing throughput, access fairness, and latency under varying vehicular densities.

Key finding: This survey classifies vehicular MAC protocols by contention mechanisms and channel access, detailing their suitability for time-constrained safety and non-safety applications. It identifies core challenges such as resource... Read more
Key finding: Through the evaluation of physical and MAC layers, this work quantifies that C-V2X offers superior performance at low vehicle densities due to better PHY efficiency, while ITS-G5 overtakes C-V2X as congestion-induced packet... Read more
Key finding: The paper introduces a truncated-exponential delay distribution at the MAC layer for probabilistic broadcast in ad hoc vehicular networks, replacing conventional uniform random delays. Analytical and simulation results... Read more

All papers in MAC Layer

This paper presents a framework to minimize energy consumption in the medium access control (MAC) layer for wireless sensor networks. While satisfying a range of quality of service (QoS) requirements, such as the packet transmission... more
The Integrated Broadcast Interaction System is implemented with a fully regenerative On-Board Processor (Alcatel 9343) designed to provide direct (distributed) DVB-RCS[1] (Digital Video Broadcasting Return Channel Satellite) compliant... more
An algorithm for cooperative Dynamic Spectrum Access in Cognitive Radio networks is presented. The proposed algorithm utilizes Medium Access Control layer mechanisms for message exchange between secondary nodes that operate in license... more
A new standard IEEE 802.15.4 was uniquely designed to suit personal wireless networks requirement consuming low power, provides low data rate and low cost. In this paper, an effort is made to analyze the performance of Low Rate and Low... more
Connected dominating set (CDS) has been used widely in mobile ad hoc networks by numerous routing, broadcast, and time synchronization protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to... more
Multicast/broadcast is an important service primitive in networks. It is supported by all IEEE 802.x standards, including 802.11. The IEEE 802.11 multicast/broadcast protocol is based on the basic access procedure of Carrier Sense... more
This paper presents a hardware/software co-design approach where different specification languages can be used in parallel, allowing effective system co-modeling. The proposed methodology introduces a process model that extends the... more
Loss Differentiation Algorithms (LDA) are currently used to determine the cause of packet losses with an aim of improving TCP performance over wireless networks. In this work, we propose a cross-layer solution based on two LDA in order to... more
This paper presents results from the Cellular IP Project at Columbia University on Internet micromobility. Cellular IP complement Mobile IP with support for fast, seamless and local handoff control, and IP paging. We discuss the design,... more
I. I NTRODUCTION A central issue in networking is how to allocate band-width effectively and fairly. The efficiency of an allocation is measured by resource utilization (or the system aggregate throughput of all the flows) under the... more
The distinguished feature of fixed backbone nodes in the wireless mesh networks (WMNs) can be utilized to design an efficient cross layer which cooperates routing and scheduling schemes for increasing end-to-end throughput. With only... more
With the rapid proliferation of broadband wireless services, it is of paramount importance to understand how fast data can be sent through a wireless local area network (WLAN). Thanks to a large body of research following the seminal work... more
We propose a novel distributed algorithm, show and prove that among all the sources with generic increasing and bounded utilities (no need to be concave) in steady state, the utility max-min fairness is achieved, which is essential in... more
In multi-hop ad-hoc wireless networks with shared medium and a contention based media access control (MAC) protocol, guaranteed quality of service (QoS) support for realtime traffic (e.g. voice, video, interactive applications etc.) is... more
To guarantee the performance of ad hoc networks, utilizing a hierarchical architecture model is necessary. An instance of this structure is clustering. In this paper a cluster-based topology control algorithm is proposed which builds an... more
This paper presents a hardware/software co-design approach where different specification languages can be used in parallel, allowing effective system co-modeling. The proposed methodology introduces a process model that extends the... more
In this paper we provide a method to analytically compute the energy saving provided by the use of Transmission Power Control (TPC) at the MAC layer in Wireless Sensor Networks (WSN). We consider a classical TPC mechanism: data packets... more
The IEEE 802.11 Task Group E will soon approve the 802.11e standard for medium access control (MAC) layer quality-of-service (QoS) enhancements to the 802.11 protocol, and it is widely believed that these enhancements will allow 802.11... more
There have been several studies on the performance of TCP controlled transfers over an infrastructure IEEE 802.11 WLAN, assuming perfect channel conditions. In this paper, we develop an analytical model for the throughput of TCP... more
This paper presents an experimental investigation of the performance impact of two important PHY layer design options that arise in 802.11 ad-hoc networks. In particular, throughput results are provided for multi-hop ad-hoc networks with... more
This paper is an experimental follow up to our earlier paper that investigated the TCP simultaneous-send problem which arises in infrastructure mode 802.11 wireless local area networks. In particular it was observed that for file transfer... more
Wireless network emulator testbeds have become increasingly important for realistic, at-scale experimental evaluation of new network architectures and protocols. Typically, wireless network performance measurements are made at multiple... more
This paper describes a beacon assisted discovery mechanism for self-organizing hierarchical ad-hoc networks. The discovery protocol, which operates between the medium access control (MAC) and network layers, is responsible for topology... more
In this paper, we analyze energy-efficient communications based on an advanced energy consumption model for wireless devices. The developed model captures relationships between transmission power, transceiver distance, modulation order,... more
Code division multiplexing (CDM)-based random access is used in many practical wireless systems. With CDM-based random access, a set of sequences is reserved for random access. A remote station transmits a random access packet using a... more
We formulate a scheduling problem that takes into account different hardware delays experienced by the secondary users (SUs) in a centralized cognitive radio network (CRN) while switching to different frequency bands. We propose a... more
In this paper we introduced a custom TDMA MAC Layer Protocol. The main idea which actuated the research was to simulate a complex MAC Protocol in a wireless environment and espy its behavior under different physical, traffic, and network... more
We provide analytical models for capacity evaluation of an infrastructure IEEE 802.11 based network carrying TCP controlled file downloads or full-duplex packet telephone calls. In each case the analytical models utilize the attempt... more
The broadcast of a message in Mobile Ad Hoc Networks requires its retransmission by multiple devices, consuming both bandwidth and power. The goal of broadcast algorithms is to select the most adequate nodes to retransmit so that the cost... more
A multihop underwater acoustic network, which consists of a series of equal-distance hops connected by relay transceivers in a tandem, is considered. Messages are originated as coded packets from a source node at one end, relayed (decoded... more
The growth of wireless network use has greatly increased research demand. Some applications, which are contextaware, must adapt to the environment. So, information on both environment characteristics and the device's hardware are crucial.... more
In order to allow for dense spatial reuse in wireless ad hoc networks, multiple access interference must be dealt with. This calls for advanced physical layer techniques, such as multiuser detection (MUD) or power control. However, these... more
In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a careful joint design of both, the physical and the MAC layer. Two... more
The deployment of wireless ad hoc networks faces severe limitations by mutual interference between wireless devices. In this work, we introduce a method to alleviate interference using a medium access control (MAC) layer exploiting... more
This article adresses the QoS compliant delivery of packet data flows through the MAC and PHY layers of a wirless communication system. The available degrees of freedom in the call admission control, the scheduling unit, the MAC protocol... more
This paper addresses the fairness of Medium Access Control (MAC) protocols that are capable of handling interference on the physical layer to a varying extent. The variation addressed is thereby not based on different physical layer... more
It has long been known that adaptive beamforming has the potential to enhance the performance of wireless ad hoc networks significantly. However, due to the decentralized nature of such infrastructure-less networks, it is not straight... more
Packet loss rates in wireless local area networks (WLANs) are highly dynamic and location dependent. Therefore, multicasting of compressed video streams over such networks requires significantly different error control approaches from... more
Energy optimization is important in wireless ad hoc networks, where node battery power is usually limited. Research results show that such a network can exploit controlled node mobility to reduce communication-related energy consumption.... more
Packet loss rates in wireless local area networks (WLANs) are highly dynamic and location dependent. Therefore, multicasting of compressed video streams over such networks requires significantly different error control approaches from... more
Energy optimization is important in wireless ad hoc networks, where node battery power is usually limited. Research results show that such a network can exploit controlled node mobility to reduce communication-related energy consumption.... more
Reverse direction transmission and block ACK are effective ways to improve the performance of MAC layer that reduces the overhead and increases the system throughput. As high as 600 Mbps of physical data rate is achieved in IEEE 802.11n... more
sensing channel and new sensor device models. The proposed architecture is generic so it can be reused for any simulation platform. The performance evaluation is based on one of the typical WSN applications: local area protection, where... more
This paper presents the measurement and statistical analysis of the temporal variations of the radio channel defined by a fixed link at 3.5 GHz in suburban areas. The analysis provides the required information about the temporal stability... more
Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter... more
Download research papers for free!