scispace - formally typeset
Search or ask a question

Showing papers on "Media access control published in 2022"


Journal ArticleDOI
01 May 2022-Sensors
TL;DR: This survey investigated the existing state-of-the-art MAC protocols, related surveys, and solutions available for mmWave frequency, performed a categorized qualitative comparison of the state of the art protocols, and examined the probable approaches to alleviate the critical challenges in future research.
Abstract: With the increase in the number of connected devices, to facilitate more users with high-speed transfer rate and enormous bandwidth, millimeter-wave (mmWave) technology has become one of the promising research sectors in both industry and academia. Owing to the advancements in 5G communication, traditional physical (PHY) layer-based solutions are becoming obsolete. Resource allocation, interference management, anti-blockage, and deafness are crucial problems needing resolution for designing modern mmWave communication network architectures. Consequently, comparatively new approaches such as medium access control (MAC) protocol-based utilization can help meet the advancement requirements. A MAC layer accesses channels and prepares the data frames for transmission to all connected devices, which is even more significant in very high frequency bands, i.e., in the mmWave spectrum. Moreover, different MAC protocols have their unique limitations and characteristics. In this survey, to deal with the above challenges and address the limitations revolving around the MAC layers of mmWave communication systems, we investigated the existing state-of-the-art MAC protocols, related surveys, and solutions available for mmWave frequency. Moreover, we performed a categorized qualitative comparison of the state-of-the-art protocols and finally examined the probable approaches to alleviate the critical challenges in future research.

5 citations


Journal ArticleDOI
TL;DR: In this paper , a cross-layer framework is proposed for hybridization between licensed in-band and dedicated unlicensed out-band control channel design approaches, which avoids the need of an extra control beacon for PCL transmission.

3 citations


Proceedings ArticleDOI
22 Apr 2022
TL;DR: Simulation results show that the proposed protocol outperforms the IEEE 802.11p, STCM, and optimized CB-MAC protocols in both highway and urban traffic scenarios in terms of normalized throughput, packet delivery ratio and average end-to-end delay.
Abstract: Contention-based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs), such as IEEE 802.11p, have been revealed inefficient performance due to merging collisions, hidden terminal problems, poor resource utilization, and inconsistency in various traffic scenarios. This paper proposes a novel clustering-based contention-free MAC (CC-MAC) protocol to handle intra-cluster and inter-cluster transmission collision problems in VANETs. A cluster head (CH) assigns the time slots to the cluster members depending on their traffic demands. Inter-cluster interference among vehicles is minimized by comparing the relative offset time and reducing access delay during the slot allocation. Furthermore, a TDMA-based predetermined scheme is proposed to improve resource utilization for both control channel and service channels, and merging collisions are resolved by disjointed slot assignment. Hidden terminal problem is resolved by detecting slot assignment identification on gateway vehicles regarding the direction of the vehicle’s mobility. Simulation results show that the proposed protocol outperforms the IEEE 802.11p, STCM, and optimized CB-MAC protocols in both highway and urban traffic scenarios in terms of normalized throughput, packet delivery ratio and average end-to-end delay.

1 citations


Journal ArticleDOI
TL;DR: In this article , the authors propose a medium access control (MAC) protocol, which is based on the idea of the medium access controller (MAC), which is used in the majority of the applications.
Abstract: 최근 장거리 통신이 필요한 재난 환경에서 무선랜을 활용하는 드론 통신 기법들이 연구되고 있지만 대부분은 링크 버짓과 같은 물리적 개선 연구만 수행되고 있다. 하지만 무선랜의 medium access control (MAC) 계층에는 거리에 영향을 받는 파라미터들이 존재하기 때문에, 장거리 통신을 완벽하게 수행하기 위해서는 이러한 파라미터들의 개선이 필요하다. 따라서 본 논문에서는 재난 임무를 수행하는 드론 기반 재난 통신망에서 장거리 환경에 따른 무선랜 MAC 프로토콜을 개선하고 이에 대한 성능분석을 수행한다. 이를 위해 패킷 레벨 시뮬레이터를 이용하여 네트워크를 구성하고, 장거리 환경에 적합한 MAC 프로토콜을 설계한다. 또한 여러 대의 드론을 배치하여 다양한 성능지표들을 결과로 제시한다.

1 citations


OtherDOI
07 Dec 2022
TL;DR: The MAC layer provides a unique id and controls the access mechanism of channels in order to interface with other nodes over shared channel by using MAC protocol as discussed by the authors , which is very helpful for delivering a data packet over an electronic network, which is not possible in the case of postal addresses.
Abstract: Media access control (MAC) is one of the sub-layers of the data link layer (Layer 2) in OSI (open systems interconnection) model. The MAC layer provides a unique id and controls the access mechanism of channels in order to interface with other nodes over shared channel by using MAC protocol. MAC address is very helpful for delivering a data packet over an electronic network, which is not possible in the case of postal addresses. Data encapsulation, including frame assembly before transmission, and frame parsing/error detection during and after reception are the two main duties of the MAC.

1 citations


Journal ArticleDOI
01 Dec 2022-Sensors
TL;DR: In this paper , the authors present an in-depth assessment and analysis of MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards.
Abstract: IEEE 802.11ah, known as Wi-Fi HaLow, is envisioned for long-range and low-power communication. It is sub-1 GHz technology designed for massive Internet of Things (IoT) and machine-to-machine devices. It aims to overcome the IoT challenges, such as providing connectivity to massive power-constrained devices distributed over a large geographical area. To accomplish this objective, IEEE 802.11ah introduces several unique physical and medium access control layer (MAC) features. In recent years, the MAC features of IEEE 802.11ah, including restricted access window, authentication (e.g., centralized and distributed) and association, relay and sectorization, target wake-up time, and traffic indication map, have been intensively investigated from various aspects to improve resource allocation and enhance the network performance in terms of device association time, throughput, delay, and energy consumption. This survey paper presents an in-depth assessment and analysis of these MAC features along with current solutions, their potentials, and key challenges, exposing how to use these novel features to meet the rigorous IoT standards.

1 citations


Journal ArticleDOI
TL;DR: In this paper , a cluster-based MAC protocol, tagged as multilevel scheduling MAC (MLS-MAC) protocol for underwater acoustic sensor networks (UASNs), is proposed.
Abstract: Underwater acoustic sensor networks (UASNs) have attracted great attention in recent years and utilizes as a part of oceanic applications. This network has to deal with propagation delay, energy constraints and limited bandwidth which are strenuous for designing a Medium Access Control (MAC) protocol for underwater communication. There also exists an idle channel listening and overhearing problem which sets down the energy into starvation in the contention-based MAC protocols. Alternatively, lengthy time slots and time synchronization equated by schedule-based MAC protocols, outcomes the variable transmission delay and degrades the network performances. To iron out these problems, we propose a cluster-based MAC protocol, tagged as Multilevel Scheduling MAC (MLS-MAC) protocol for UASN in the paper. The cluster head is a decision maker for packet transmission and aids to inflate the lifetime of sensor nodes. To reinforce the channel efficiency, the multilevel scheduling in data phase is initiated with two queues depending on the applications fixed by the cluster head. The simulation result shows that the MLS-MAC has increased the network throughput and has decreased energy consumption.

Proceedings ArticleDOI
21 Jan 2022
TL;DR: In this article , a new media access control MAC protocol for access PLC networks is presented, EMA-PLCS protocol has enhanced Success rate, Average ETE delay of network, Network throughput, and number of STA slots.
Abstract: Nowadays PLC are existence measured as a substitute for high hustle data infrastructures and internet interaction. Presently BPLC is a part for AMI and HAN with several channels in nearly each rooms, PL’S are now the most collective network in the ordinary or small office. This works presents a new media access control MAC protocol for access PLC networks. The beacon time slot allocates all access points to their own site time slots. It is not necessary to send each STA's beacon slot in a beacon period, reducing the time for sending data messages. In the process of multi-site access to the network, some STAs still broadcast and send discovery beacons when no new nodes are connected to the network, which will cause the broadcast of the discovery beacon to be worthless and waste broadcast frames and discovery beacon slots. In order to send as many data frames as possible in a beacon period. Outcomes of OPNET 14.5 simulation illustration that compared with the system of literature [12] protocol and IEEE 1901.1 protocol. Proposed new EMA-PLCS protocol has enhanced Success rate, Average ETE delay of network, Network throughput, and number of STA slots.

Posted ContentDOI
09 Oct 2022
TL;DR: In this article , a RIS-assisted random access (RA) protocol is proposed, where the RIS configuration can be opportunistically controlled to favor the transmission of some UEs without the need to explicitly perform channel estimation.
Abstract: The widespread adoption of Reconfigurable Intelligent Surfaces (RISs) in future practical wireless systems is critically dependent on the integration of the RIS into higher-layer protocols beyond the physical (PHY) one, an issue that has received minimal attention in the research literature. In light of this, we consider a classical random access (RA) problem, where uncoordinated users' equipment (UEs) transmit sporadically to an access point (AP). Differently from previous works, we ponder how a RIS can be integrated into the design of new medium access control (MAC) layer protocols to solve such a problem. We consider that the AP is able to control a RIS to change how its reflective elements are configured, namely, the RIS configurations. Thus, the RIS can be opportunistically controlled to favor the transmission of some of the UEs without the need to explicitly perform channel estimation (CHEST). We embrace this observation and propose a RIS-assisted RA protocol comprised of two modules: Channel Oracle and Access. During channel oracle, the UEs learn how the RIS configurations affect their channel conditions. During the access, the UEs tailor their access policies using the channel oracle knowledge. Our proposed RIS-assisted protocol is able to increase the expected throughput by approximately 60% in comparison to the slotted ALOHA (S-ALOHA) protocol.


Journal ArticleDOI
TL;DR: In this article , a barrier-free access control system (RF-Access) with UHF RFID technology is proposed, which provides non-intrusive access control by removing flap barriers and operations of swiping the card.
Abstract: Traditional RFID-based access control systems use flap barriers to help manage pedestrian access and block unauthorized staff at any entrance, which requires visitors to swipe their cards individually and wait for the opening of the blocking body, resulting in low-frequency pedestrian access and even congestion in places with large passenger flow. This paper proposes a barrier-free access control system (RF-Access) with UHF RFID technology. The main advantage of RF-Access is that it provides non-intrusive access control by removing flap barriers and operations of swiping the card. The visitors just go across the system without any stay at the entrance. Meanwhile RF-Access performs the authentication, which greatly improves time efficiency and quality of service. RF-Access addresses two key issues of the non-intrusive access control: motion direction detection and illegal intrusion detection. In RF-Access, we first propose a dual-antenna system setup together with a time-slot-based model to monitor users’ moving directions, which is robust to different environmental factors, such as multi-path effects. Afterwards, we use a tag array to detect illegal intrusion in case attackers do not carry any RFID tags. We implement a prototype of RF-Access with commercial RFID devices. Extensive experiments show that our system can detect the moving direction with 99.83% accuracy and detect illegal intrusion with an accuracy of 96.67%.

Proceedings ArticleDOI
15 Nov 2022
TL;DR: In this paper , the effects of backoff time on CSMA/CD and collision rate performance in a simple MAC protocol were investigated, including Binary Exponential Backoff (BEB), Pessimistic Fibonacci Back Off (PFB), and Optimistic Linear Exponential backoff (OLEB).
Abstract: A standard Ethernet implements carrier senses multiple access with collision detection (CSMA/CD) as the media access control (MAC) protocol to govern and control the data transmission between stations in a shared medium. The MAC protocol also contains the backoff algorithm responsible for rescheduling a packet's transmission after a collision has happened. However, most existing models are based on non-real-time systems, which is not an accurate representation of real-time network conditions. This paper aims to investigate the effects of different backoff algorithms, including Binary Exponential Backoff (BEB), Pessimistic Fibonacci Backoff (PFB), and Optimistic Linear Exponential Backoff (OLEB), based on the different conditions. This study examined the effects of backoff time on CSMA/CD and collision rate performance in a simple MAC. Simulated test results vary for all backoff algorithms depending on different network sizes and model conditions. Overall, the OLEB algorithm performs better than the other algorithms with networks of 15 active nodes, depending on the lower delay and better network performance measurements.

Journal ArticleDOI
TL;DR: This work provides a model-based design approach for modeling CSMA/CA and ALOHA random-access protocols for packetizing wireless networks and shows the effectiveness of CSMA /CA over AlOHA modes when comparing the corresponding Back-off waveforms and when calculating the throughput values of the three network nodes.
Abstract: Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local networks (WLAN). These wireless networks have grown to be the everywhere connection solution in residential and public access networking protocols. It is important to know which strategy performs better with the least amount of delay. The Multiple Access Control protocols (MAC) that are relied on ALOHA, and Carrier Sense Multiple Access with collision avoidance (CSMA/CA) as random access techniques, have substantially aided the rapid growth of such wireless access networks. This work provides a model-based design approach for modeling CSMA/CA and ALOHA random-access protocols for packetizing wireless networks. We analyze the TX and Back-off waveforms of the PHY/MAC transceiver of three radio nodes under CSMA/CA and ALOHA operation modes and compare the obtained results of the PHY/MAC Transceiver for the network nodes according to these modes. Every node is within a range such that the communication between each couple of nodes can be interfered with and received data from the third node. The MAC layer and the logical link control function composed the data link layer. Since the same radio band is used for TX and RX, the MAC function employed here is CSMA/CA and ALOHA, which had also called a random back-off. The MAC layer sends a control signal to the TX block to transmit either a data frame or an acknowledgment frame. The frame contents are loaded in the look-up tables. The contents can be changed in the workspace. The output of this block is a complex baseband IQ signal. The obtained results show the effectiveness of CSMA/CA over ALOHA modes when comparing the corresponding Back-off waveforms and when calculating the throughput values of the three network nodes


Proceedings ArticleDOI
01 Jan 2022
TL;DR: In this paper , the frequency-domain features of the signals can be extracted by analyzing the Ethernet card signals of wired terminals received by the switch, which can be effectively classified and identified.
Abstract: In the local area network (LAN) system, most terminals are connected to edge switches through fast or gigabit Ethernet connections. The terminal access security problem has always been a key concern. This paper proposes a method of Ethernet card fingerprint extraction and identification based on spectrum characteristics, which solves the problem of illegal terminal access with counterfeit media access control (MAC) addresses. The extracted Ethernet card fingerprint is used as the identity of the terminal, which is unique and difficult to be counterfeited. The frequency-domain features of the signals can be extracted by analyzing the Ethernet card signals of wired terminals received by the switch. The dimension of these features is reduced to obtain their Ethernet card fingerprints, which can be effectively classified and identified. In the classification and recognition experiments on 7 Ethernet cards of 100M produced by the same manufacturer, 26 Ethernet cards by different manufacturers, and 65 Ethernet cards by mixed manufacturers, all Ethernet cards can achieve an accuracy of 100%. This method can be widely used for identity authentication during the access and connection of terminals and provides a secure access control scheme.

Posted ContentDOI
16 Oct 2022
TL;DR: In this paper , the authors analyse the possible problems of the current MAC protocols in IEEE 802.11, particularly in the IEEE 802-802.11-2020 standard, and propose new solutions for the next generation (WNG).
Abstract: The network protocol architecture not only can be designed from the traditional view of layers, but also can be designed from the view of planes, i.e., the data, control and management planes. Media access control (MAC) is a function of the data link layer, and thus the MAC protocols involve of both the data and control planes. However, although the international wireless local area network (WLAN) standard, IEEE 802.11 or Wi-Fi, has developed over 20 years, the control plane of the MAC protocols is not explicitly described yet. Thus, does it need to separate the MAC protocols into data and control planes? If not, are there some problems in existing hybrid architecture? To answer above questions, we analyse the possible problems of the current MAC protocols in IEEE 802.11, particularly in std 802.11-2020. These problems can be seen as new starts for the next study of the WLAN for the next generation (WNG).

Book ChapterDOI
DA-100 Dumps1
01 Jan 2022
TL;DR: In this article , an opportunistic spectrum distribution protocol (OSDP) is proposed to provide a parallel communication process, which performs spectrum distribution on considering the transmission history, fuzziness present in the channel due to different paths, path changes, and priority of data transmission.
Abstract: At present, the dynamic spectrum access (DSA) is the core technique that has been widely researched. As it allows the secondary users to access the white space, it increases the utilization of spectrum. This reduces the spectrum scarcity and detrimental interference induced by network glitch. It reworks on the occupied frequency bands and does not interfere the primary users. The physical layer defines the relationship between the device and transmission media in responsible of broadcasting the information. The medium access control (MAC) shares the media basis for many broadcast networks using DSA and static channelization. This MAC accords the data to multiple users by employing the spectrum sensing and spectrum accessing in the channel. MAC protocol broadcasts the channel by managing the traffic, operates the activities between the media, and avoids the collision in WSNs. Along with, the fuzzy logic develops the solution for the inaccuracy and insufficient network. In this paper, a novel protocol named opportunistic spectrum distribution protocol (OSDP) is proposed to provide a parallel communication process. The proposed protocol performs spectrum distribution on considering the transmission history, fuzziness present in the channel due to different paths, path changes, and priority of data transmission. It gives the dynamic response in transmitting the data with better efficiency and minimum error rate. The simulation results describe the benefits of the proposed OSDP over IEEE 802.15.4 and SMAC in parameters of end-to-end delay, throughput, and energy consumption.

Book ChapterDOI
Takuo Hoshi1
01 Jan 2022
TL;DR: In this paper , an improved MAC protocol design is proposed, which hybridizes MAC protocols like TDMA, bit-map-assisted (BMA) and sensor MAC (SMAC), and then adds multi-channel capabilities to it in order to improve the network Quality of Service (QoS) parameters.
Abstract: Medium access control (MAC) protocols are responsible for handling the interactions between different communication mediums. They perform tasks like frame delimitation, addressing of nodes, providing transparency to data communication, protection against errors, etc. In this paper an improved MAC protocol design is proposed, which hybridizes MAC protocols like Time division multiple access (TDMA), bit-map-assisted (BMA) and sensor MAC (SMAC), and then adds multi-channel capabilities to it in order to improve the network Quality of Service (QoS) parameters. The proposed protocol also incorporates sleep scheduling capabilities to the hybridized multi-channel MAC protocol in order to further optimize the network lifetime, and reduce routing computational complexity. The proposed protocol is compared with non-hybridized implementations of standard MAC protocols, and it is observed that a delay reduction of more than 20% is achieved, along with an improvement of 10% in the overall network lifetime, which can be used for sustainable development in smart cities that require low energy.

Journal ArticleDOI
01 Dec 2022-Optik
TL;DR: In this article , the authors proposed a new channel access protocol based on the principle of ultraviolet power superposition, which can reduce the conflict loss of multi-node competing access by a special control frame.

Posted ContentDOI
15 Nov 2022
TL;DR: In this article , a synchronous and distributed medium access control (MAC) protocol for multihop wireless networks that provides bandwidth guarantees to unicast connections is proposed, which is based on a slotted time division multiple access (TDMA) architecture with a multi-mini-slotted signaling phase scheduling data transmissions over slots in the following data phase.
Abstract: We describe a new synchronous and distributed medium access control (MAC) protocol for multihop wireless networks that provides bandwidth guarantees to unicast connections. Our MAC protocol is based on a slotted time division multiple access (TDMA) architecture, with a multi-mini-slotted signaling phase scheduling data transmissions over slots in the following data phase. Resolving contentions at the beginning of a frame allows for effective utilization of bandwidth. Our protocol essentially combines the benefits of TDMA architecture with the distributed reservation mechanism of IEEE 802.11 MAC protocol, thereby performing well even at high loads. We implement a two-way handshake before each data slot to avoid deadlocks, a phenomena that plagues 802.11. Through theoretical analysis, we derive the system throughput achieved by our MAC protocol. We implemented our MAC protocol into ns-2 simulator, and demonstrate its vast superiority to IEEE 802.11 and a synchronous MAC protocol CATA through extensive simulations.