A Survey of MAC Protocols in Ad Hoc Networks Mingyu Wu, Ph. D student in Computer Science The University of Texas at Dallas Advisor: Dr. Andras Farago This website is for private research purpose only. All the texts, graphs and linked literatures are NOT for public sharing. CONTENTS: Introduction Literature Reviews Carrier Sense Medium Access (CSMA) Medium Access Collision Avoidance (MACA/MACAW) Floor Acquisition Multiple Access (FAMA/FAMA-NCS) 802.11/802.11e Differentiated Distributed Coordination Function (DDCF) Rate-Adaptive MAC (RBAR) Infrastructure-Based MAC (MPC-MAC) CDMA-Based MAC (CA-CDMA) Dual Busy Tone Multiple Access (DBTMA) Bidirectional Multi-channel MAC ((Bi-MCMAC) Adaptive Clustering (AC-MAC) Directional 802.11 (MAC-DA1/MAC-DA2) Directional DBTMA (DBTMA-DA) Comparison Paper List with Abstracts Paper List only * Introduction An mobile ad hoc network (MANET) is a wireless network temporarily and spontaneously created infrastructure or by central mobile control. stations without Network requiring managements any and communications are typically performed in a distributed manner. Though ad hoc networks are treated with little difference in IEEE standards for wireless networks as a whole, some unique features make ad hoc networks distinct from other types of wireless networks such as wireless LANs. The first peculiarity is infrastructureless, i.e. there is no pre-existing hardware like base stations in traditional cellular networks or any centralized mechanism managing the network. Ad hoc networks are usually deployed in emergent and temporary situations such as accidents or public gatherings, where mobile stations (MSs) may join the network at will, move around, or become disconnected at any time. Global synchronization is hard to achieve in such situations. And it is unrealistic to expect such a network to be fully connected, in which case a MS can communicate directly with every other nodes in the network via wireless channels. As a result, the second important feature emerges - multihop communication. each node in the network has to take the responsibility of relaying packets for its peers and a packet may traverse multiple nodes before it reach the destination. Two typical problems, namely hidden node and exposed node, come along with multihop communication. We will discuss these two problems in details in the next chapter. And, indeed, the major effort of research in this are are focusing on how to solve these two problem. Another major concern and interest of investigations in ad networks is energy saving. Since ad networks solely consist of mobile stations which also play the role of packets transmitters, if the battery of any single node run out, it may jeopard the connectivity of entire network besides the fact that the node itself stops being functional. Hence, the network should be cleverly designed so that no battery energy would be wasted. Dynamically adjusting transmission power according to the changing environment seems to be a possible way to extend the battery life. The incorporation of directional antennas to enhance signal transmission quality and lesson inference could be another solution for the energy problem. Because of the above-mentioned features, the state of ad hoc networks is far less predictable than that of other networks and it is quite natural for individual nodes to share the common wireless channels via distributed mechanisms. Thus, how the medium access control (MAC) layer is designed to allocate the communication resources efficiently and fairly of ad hoc networks largely determines the network performance which can be measured in term of throughput, transmission delay and fairness, etc. In the following parts of the survey, we briefly introduce a variety of MAC protocols that have been proposed for ad hoc networks and examine their pros and cons. * Literature Reviews Carrier Sense Medium Access (CSMA) Due to the lack of centralized control in ad hoc networks, researchers have been mainly focused on contention based MAC protocols in this area. Carrier Sense Medium Access (CSMA) is one of the earliest mechanisms adopted for ad hoc networks. In CSMA, a transmitter will first sense the wireless channel in the vicinity and refrain itself from transmission if the channel is already in use. Various methods such as ALOHA [26] and n-persistent algorithms [24] can used to determine how long the deferred node should wait before the next attempt. CSMA introduces hidden node and exposed node problems, which are mentioned earlier. In Fig. 1, we assume each node can communicate with another node only if there is a link (solid line) between them. When node A is sending a packet to B, C cannot sense the ongoing signal as it is out of the communication range of A and may try to send a packet to B as well. Then a collision will happen at node B. This is being called hidden node problem, where a node out of the range of the transmitter is potentially to cause collisions. On the other hand, as in Fig. 2, if node B is sending a packet to A, node C will sense the transmission signal and refrain itself from sending anything to D even NO collision would occur in such case. This is a typical exposed node problem, in which case a node within the range of the transmitter may be unnecessarily prohibited from accessing the medium and thus decrease the network throughput. Fig. 1: Hidden Node Problem with Physical Sensing (C hidden from A) - Collision Fig. 2: Exposed Node Problem with Physical Sensing (C exposed from B) Inefficiency Medium Access Collision Avoidance (MACA/MACAW) To solve the problems with physical sensing, the mechanism of "virtual sensing", or packet sensing by some researchers, has been proposed. The virtual sensing mechanisms typically rely on the transmitter and receiver to perform a handshake prior to the transmission of the data packet. More specifically, The Medium Access Collision Avoidance (MACA) method proposed by Karn [16] implements the handshake via a pair of Request-To-Send (RTS) and Clear-To-Send (CTS) messages. When a node wants to send data to another, it first sends a short RTS packet to the destination. The receiver responds with a CTS packet. On receipt of the CTS, the sender sends its queued data packet(s). All other nodes overhearing the CTS message will defer themselves from sending out any packet until the predicted transmission period, which is indicated in the CTS packet, is passed. Any node that overhears the RTS signal but not CTS is ok to send out packets in a certain time period as either the RTS/CTS handshake is not completed or it is out of range of the receiver. MACAW [17] is an enhancement of MACA that utilize a RTS-CTS-DS(Data Sending)-Data-ACK message exchange and a new back-off algorithm. Ideally, such RTS/CTS message exchanges should resolve the hidden/exposed node problems. However, as indicated by Haas and Deng, new types of hidden/exposed node problems emerges when pure virtual sensing protocols are used. Let us still explain the problems by examples. In Fig. 3, after node A and exchange RTS/CTS messages, A begins to transmit a data packet to B. At the same time, node D wants to send a data packet to C and initiate a RTS/CTS handshake. Though C is allowed to receive to receive the data packet from D since it doesn't conflict with the transmission from A to B, C is NOT permitted to access the channel and answer D's RTS message as it hears C's CTS message. There are two issues to be further clarified with such problem. If we consider node B as a transmitter (of the CTS message) and node C as another potential transmitter (of another CTS message), this can still be called an exposed node problem (C is exposed to B). But, in our opinion, it would be more appropriate to name it hidden node problem since node A and D are the transmitters of the data packets and node B and C are the receivers, in the conventional sense. We further classify such case as an inefficiency problem which the network bandwidth is underused, in contrast to the original hidden node problem where packet collisions occur. Similarly, another type of exposed node problem also occurs in case of pure virtual sensing, as the example shown in Fig. 4. Here a data packet is transiting from node B to A after the exchange of RTS/CTS. Now node C sends a RTS to D and waits for a corresponding CTS, which may not be received. The reason is, since the channel in the vicinity of node C is occupied by B, a collision may happen at C when D sends back the CTS. Again, the definitions of transmitter and receiver are associated with data packet, not control packets (i.e., RTS/CTS). Please note that collisions occur in such exposed node problem and the traditional problem with CSMA incurs underutilization of the network bandwidth. Fig. 3: Hidden Node Problem with Virtual Sensing (C hidden from A) - Inefficiency Fig. 4: Exposed Node Problem with Virtual Sensing (C hidden from A) - Collision Floor Acquisition Multiple Access (FAMA/FAMA-NCS) By recognizing the problems existing in either pure physical or virtual sensing mechanisms, Garica-Luna-Aceves and Fullmer propose the Floor Acquisition Multiple Access protocol (FAMA/FAMA-NCS) [15], which basically exploit both sensing techniques. In FAMA-NCS (FAMA non-Persistent Carrier Sensing), the candidate sender needs to acquire the privilege of using the "floor" (the channel) before it actually send out the data packet. And the candidate sender initiate both physical (carrier) and virtual sensing processes to compete for the common channel with its neighbors. In case either the node detect ongoing signal in the channel or the RTS/CTS process is not successful, it will back off from further transmission. The lengths of RTS and CTS messages are carefully chosen so that they will be in full effects. Specifically, the length of an RTS is longer than the sum of maximum propagation delay, the transmit-to-receive turn-around time and expected processing time. This is to ensure that the RTS will reach any adjacent node before any node receive the complete packet. Further, a CTS is longer than an RTS to guarantee a so-called "CTS-Dominance", which means any neighboring node (of the CTS sender) transmitting an RTS at the same time will at least hear part of the CTS and defer itself. Thus, the dominating CTS acts as a busy-tone to protect the following data packet transmission from collision. However, as pointed out in [13], CTS-Dominance may lead to unexpected adverse effect in the presence of RTS-collision. In any ad hoc network MAC protocol, if nodes compete with each other by sending RTSs via a shared channel, there is no way to prevent potential collision of multiple RTSs at a same receiver. In FAMA/FAMA-NCS, if a node detects such RTS collisions, the node may treat it as CTS dominance and refrain itself from accessing the channel for the transmission time of the non-existing data packet. Since the transmission time of data packets is usually much longer than control packets, the channel resource is considerably wasted. The problem becomes more severe as network load increases and RTS collisions happen more frequently. The point is, even in the cases where RTS collisions are inevitable, their impacts should not be falsely amplified. What is more, FAMA-NCS is unable to completely address both the hidden node inefficiency and exposed node collision problems explained earlier. 802.11/802.11e The IEEE 802.11 MAC protocol [1] is another example of using both physical sensing and RTS/CTS handshake mechanisms. 802.11 is actually defined as the standard MAC and physical protocols for wireless LANs, not specially designed for multihop ad hoc networks. The MAC sublayer consists of two core functions: distributed coordination function (DCF) and point coordination function (PCF). DCF controls the medium accessing through the use of carrier sense multiple access with collision avoidance (CSMA/CA) and a random backoff time following a busy medium period. Carrier sense in CSMA/CA are performed both through physical and virtual mechanisms. In addition to RTS/CTS exchanges, all data packet receivers immediately sends back positive acknowledgment (ACK packet) so that retransmission can be scheduled by the sender if no ACK is received. The RTS and CTS packets used in DCF contain a Duration/ID field defining the period of time that the channel is to be reserved for the transmission of the actual data packet and the ACK packet. All other nodes overhearing either the RTS or CTS or both set the their virtual sense indicator, named as network allocation vector (NAV) for the channel reservation period as specified in RTS/CTS. Basically, a node can access the channel only if no signal is physically detected and its NAV value becomes zero. RTS/CTS mechanism in 802.11 can also be used in the situations where multiple wireless networks utilizing the same channel overlap, as the medium reservation mechanism works across the network boundaries. While DCF is designed for the asynchronous contention-based medium access, the 802.11 MAC protocol also defines PCF which is based on DCF and supports allocation-based medium access in the presence of an access point (AP). An AP plays the role of a point coordinator and polls each participating (called CF-pollable) nodes in a round robin fashion to grant medium access on allocation basis. In 802.11, DCF and PCF are used alternatively if the later is in effect. Obviously, PCF is basically considered unsuitable for ad hoc networks because of the lack of centralized control in such networks as discussed earlier. But the major advantage of PCF is that it can guarantee maximum packet delay and thus provide quality-of-service in a sense. For this reason, some researchers indeed try to modify the PCF method to make it usable in ad hoc networks. We will talk about this later. IEEE 802.11e [10], the recently proposed draft specification adding QoS features to the existing 802.11 standard, provides two new MAC functions, namely enhanced distribution coordination function (EDCF) and hybrid coordination function (HCF). Basically, with these two new functions, 802.11e supports up to eight priority traffic classes (TC) so that time-sensitive packets such as voice-over-ip packets will be able to acquire better chance for transmission than other types of packets. Within a node, each TC has an independent data packet queue. When a node is ready to transmit and there are packets waiting in more than one queues, the transmit opportunity (TXOP) is given to the TC queue with the highest priority. Also, in HCF, the coordinator is able to issue a QoS polling to a particular node that has time-sensitive data. Though the 802.11 MAC layer protocol intends to address the hidden node problem, it pays almost no effort in resolving the exposed node problem. And both the hidden node inefficiency and exposed node collision problems still exist in 802.11. Based on simulation results, Xu and Saadawi [3] report that some serious instability and unfairness problems occur when TCP in used on top of 802.11 in ad hoc networks. According to their analysis, the problems are rooted in the fact that the 802.11 MAC protocol does not address the hidden/exposed problems as expected and some inappropriate parameter settings. In spite of the problems mentioned above, the IEEE 802.11 standard has rapidly gained its popularity because its simplicity and easy to implement. It is actually now widely used in almost all test beds and simulations for the research in ad hoc networks. Due to this fact, we feel that an MAC protocol would be of more practical values if it is compatible with 802.11. In [22], Xu, et al, give a mathematical derivation that, based on certain assumptions, the interference range of a receiver is usually 1.78 times the transmitter-receiver distance. Their simulation results also show that large interference range deteriorates the performance of ad hoc networks as a node that can not successfully receive a CTS packet is still able to cause interference at the sender of the CTS. Based on such motivation, the authors suggest a simple fix where a node can only reply to an RTS with a CTS if the receiving power of the RTS is larger than a certain threshold, i.e., the expected receiver is close enough to the transmitter to avoid perceivable interference from other nodes. Similar efforts to tune the 802.11 protocol for ad hoc networks can also be found in [14, 23]. Differentiated Distributed Coordination Function (DDCF) Bononi, et al, [9] propose a different modified version of DCF defined in 802.11 to support QoS. The objective of the proposed differentiated DCF (DDCF) is to implement node differentiation based on distinct node roles, which are assigned by the clustering method performed in an upper-layer. This is different from 802.11e, which is to provide QoS on flow basis. The authors assume their scheme is intended to for larger scale ad hoc networks and certain virtual clustering method is available to determine different node roles such as cluster heads and leaf nodes. In general, a node belonging to a higher layer in the clustering structure will be given higher priority to access the channel than a node in a lower layer. This is because a node in a higher layer will take more responsibilities in administrating the network and relaying packets between clusters, hence suffer heavier traffic load. The differentiated channel accesses in DDCF is achieved by applying different inter-frame space (IFS) and contention windows (CW) values, which are parameters defined in 802.11 and used to synchronize channel accesses of nodes. One issue worth of mention is that the authors summarized four possible ways to obtain differentiated priority support in the 802.11DCF protocol: "i) the exploitation of variable IFS (like in PCF and EDCF), ii) variable CW ranges for the selection of the backoff counter (related to the contention control), iii) variable PBF (affecting the way the CW may increase after a collision), and iv) the size of transmitted frames (because a channel capture for long frames is a way to gain in throughput with respect to peer nodes contending with short frames)." Our preliminary thought is that such features may also be exploited in case we want to implement different priorities for control and data packets to achieve objectives other than QoS, e.g. implementing efficient busy tone schemes in single channel scenarios. Rate-Adaptive MAC (RBAR) Some researchers have investigated the effects of dynamically tuning some parameters in 802.11 as well as general MAC protocols for ad hoc networks. Holland, Vaidya and Bahl present a Received-Based AutoRate (RBAR) protocol that adjusts the transmission rate according to latest channel condition. In the scheme, the channel quality estimation and rate selection are performed on the receiver side, because the authors believe the channel quality experienced by the receiver actually determines whether a packet can be successfully received. The channel quality estimation and rate selection are carried out on a per-packet basis through modified RTS/CTS packets, which contain the desired transmission rate and the size of the data packet rather than the duration of the reservation. Other nodes hearing the RTS/CTS packets calculate the reservation duration based on the provided information. With such modifications, RBAR protocol can be incorporated into 802.11. According to the simulation results, RBAR improves the network throughput over previous proposed rate adaptive protocols. The disadvantage of RBAR is computation overhead. Since the channel quality sensing/estimation is performed per packet, the overhead will be considerable under heavy traffic and eventually leads to longer packet delay. Infrastructure-Based MAC (MPC-MAC) As mentioned earlier, the implementation of PCF function requires a central coordinator and thus not applicable to ad hoc networks. But since PCF can assist in providing QoS and priority access to time-sensitive traffic, You and Hassanein propose a variation of the original PCF and apply it to ad hoc networks. The proposed method, namely Mobile Point Coordinator (MPC), allows an ad hoc network to create a virtual infrastructure on-the-fly by selecting certain nodes as MPCs. The selected MPCs will function as the point coordinators as specified in 802.11 PCF protocol. MPCs and the cluster information are created and maintained dynamically by periodically broadcasting "hello" messages. The infrastructure is maintained in such way that a minimum distance between any two MPCs (i.e. cluster heads) will be kept and each MPC will tend to coordinate as many nodes as possible. Based on the MPC method, a new MAC protocol (MPC-MAC) for ad hoc networks is presented. In MPC-MAC, DCF and PCF work in turn as described in the 802.11 specifications. Basically, a free node, i.e., which has not joined a cluster yet, call only transmit its data packets during the DCF period. And only time-sensitive data packets from those that are coordinated by MPCs can be transmitted during the PCF period. Hence, time-sensitive packets have higher priority in transmission and QoS is guaranteed. Despite the benefits gained by using MPCs, the protocol has following disadvantages. First, additional messages and computation overhead are required for maintaining clustering information. Smaller overhead may be achieved by broadcasting "hello" messages less frequently. But the accuracy of the cluster information will be impaired. What is more, as in any cluster-based networks, the MPCs may become the bottleneck of the network performance and single-node-failure scenario may occur. Adaptive Clustering (AC-MAC) The MPC-MAC protocol introduced above exploits the concept of "clustering" in ad hoc networks. It doesn't specify which clustering algorithm it uses or how effective the clustering mechanism is. Here let us take a look at a specific clustering strategy for mobile, multihop, multimedia (M3) wireless networks presented by Lin and Gerla [8]. According to the authors, there are three major advantages of their CDMA-based adaptive clustering strategy. First, channel resources are reused from cluster to cluster i.e., two adjacent clusters are able to choose two different CDMA codes that generate neglectable interference. Second, inside each cluster, channel resources can be shared in an allocation-based manner. For example, as in the MPC-MAC protocol, the polling-based PCF protocol may be incorporated in ad hoc networks when clustering is available. Thus, QoS is achieved is ad hoc networks. Finally, the clusters are independently (i.e., in distributed manner) and dynamically maintained, and can be reconfigured with minimum overhead as nodes get connected/disconnected or move. The distributed clustering algorithm introduced in the paper will generate non-overlapping, 2-hop-away clusters in an ad hoc network. The maximum hop distance within a cluster is small so that synchronization inside the cluster is feasible. The CDMA code assignment and channel access control are performed as following. Each cluster is assigned a transmitting code distinct from its neighbors for the intra-cluster communications. This means there is no inter-cluster interference. And when an interconnecting node, a node adjacent to any node in another cluster, is idle, it will randomly pick and listen to one of the codes used by its neighbors. Within each cluster, all the nodes are synchronized and the channel is shared using TDMA scheme. Note that there is no central node needed as the cluster size is relatively small and each node has the complete information of its cluster. The main advantage of such TDMA scheme is there is no single-node-failure problem as in the MPC-PCF protocol. But on the other hand, channel resource is wasted when traffic load is low. And when the number of nodes in a cluster grows, the minimum transmission delay also increases. CDMA-Based MAC (CA-CDMA) In [4], Muqattash and Krunz investigate the impact of the so-called near-far problem in random access CDMA schemes, where nodes compete for channel resources without admission control. The near-far problem occurs when the CDMA codes used to a network are not perfectly orthogonal to each other (non-zero correlated) due to the limited resources, and all transmitters use the same transmission power. Under such conditions, the signal from a transmitter closer to a receiver may cause the receiver unable to correctly decode signals from a farther transmitter. The two core ideas of the proposed protocol are splitted bandwidth (or say multi-channel) and controlled access (CA). By splitted bandwidth, it means the available bandwidth in a network is divided into two non-overlapping channels: one used for transmitting control packets (i.e., RTS/CTS) and the other for data packets. Therefore, the control and data packets won't interfere with each other. For the controlled access part, a predetermined interference margin is used as a threshold. In general, a node ready to transmit first detects the condition of the channel in its vicinity and compute out the maximum allowable power level that will not disturb any ongoing transmission. Then the node sends out a RTS including the maximum allowable power level. Upon receiving the RTS, the potential receiver also detect the condition of the adjacent channel and calculate the allowed power on the receiver side and the minimum power level required for the successful receipt of the packet. If all required conditions satisfied, the receiver will reply with a positive CTS with desired power level. Otherwise, it sends back a negative CTS to prevent further retransmission of the RTS. Thus, admission control is achieved and the upcoming transmission power is dynamically adjusted according to the channel condition, in order to avoid interfering with ongoing signals. Obviously, the proposed scheme is considerably complicated in terms of both hardware and software. First, it requires parallel CDMA circuits to simultaneously monitor the data and control packets. And the channel condition detection and power level estimation are perform on per-packet basis, which may incur perceivable overhead. Dual Busy Tone Multiple Access (DBTMA) In the previous section, we have seen an example of splitting the whole bandwidth into multiple channels in ad hoc networks. Here we discuss another multi-channel scheme - Dual Busy Tone Multiple Access (DBTMA) protocol proposed by Hass and Deng [13]. The major motivation and argument for the authors to adopt the multi-channel strategy is, as we present earlier, either using physical or virtual sensing or the combination of these two sensing methods via single channel cannot completely resolve the hidden node and exposed node problems. Hass and Deng borrowed the basic idea of busy tone from the Received-Initiated Bust-Tone Multiple Access scheme [18], where the data packet receiver broadcasts a out-of-band busy tone during the process of transmission. The busy tone serves two roles. First, it takes the same function as CTS to acknowledge the RTS from the data packet sender. Second, it prevents nearby nodes from interfering with current transmission. In addition to the receive busy tone, DBTMA also uses a transmit busy tone, which a transmitter will send out through the transmission of its RTS packet. Thus, the RTS will have better opportunity to be successfully received by the intended receiver. Note that the possibility of the collision of two RTS packet still exists, though it has been reduced by using the transmit busy tone. The simulation results presented in the paper show significant improvement in terms of network throughput over previous proposed schemes. But the problems of DBTMA is it requires more complicated hardware than what is required by 802.11 to implement the two out-of-band busy tones. Also, the authors assume the bandwidth allocated to the two busy tones are neglectable, which is not necessarily true under heavy traffic conditions. Finally, it is quite difficult to make this scheme compatible with 802.11 without major modifications, in terms of both hardware and software. Bidirectional Multi-channel MAC (Bi-MCMAC) Kuang and Williamson [12] also point out that RTS/CTS fails to solve the hidden node problem completely. Their solution, namely Bidirectional Multi--channel MAC (Bi-MCMAC) protocol, is to divide the bandwidth into one control channel and several data channels. The scheme is called bidirectional because the data packet receiver may send its own outgoing data packet to the sender after the receipt of the first packet. More specifically, the scheme uses the RTS-CTS-Data-ACK handshake. After receiving the first data packet, if the receiver has an outbound packet for the same sender, it will send out the data packet directly and piggyback the acknowledge information. Otherwise, the receiver sends back a normal ACK packet. The purpose of doing so is to save the handshake procedure for the second data packet and hence enhance the throughput. To utilize the multiple data channels, the formats of RTS/CTS packets have to be modified to specify which data channel is to be used. The NAV field also has to be modified so that other nodes will be able to record the reservation information for each channel. When a node has a data packet ready, it sends out a modified RTS to the intended receiver with a list of free channels available on the sender side. Upon the receipt of the RTS, the receiver checks its own list of available free channels and compare it with the list coming with the RTS. If there is at least one common channel from both lists, the receiver pick one such channel and send back a CTS with necessary information. Note that the free channel information is not guaranteed to be valid due to the constant change of the environment. To increase the opportunity of successful selection of the free channel, a heuristic strategy is used: the receiver always tends to select the channel used in the last successful transmission, given this channel is available. Otherwise, the receiver simply picks the lowest-numbered channel. Splitting one data channel into multiple channels is an interesting topic and more research than what is presented in this paper can be done to investigate the impact of such strategy on the network performance. Directional 802.11 (MAC-DA1/MAC-DA2) In [2], Huang and Shen summarize various MAC protocols for ad hoc networks using omnidirectional and directional antennas, and compare the differences between these two groups. The omnidirectional MAC protocols listed in the paper include 802.11, MACA/MACAW, FAMA, and DBTMA, while the directional category includes the corresponding directional versions of the four protocols [2, 19, 20]. The directional antenna model assumed in the paper is as following. "Each node is equipped with a directional antenna consisting of N antenna elements which are deployed into non-overlapping fixed sectors each spanning an angle of 36O/N degrees. When being transmitted, a signal will be propagated in exactly one or all of the sectors, which corresponds to unicast and broadcast, respectively. Signals will be sensed in all sectors and the antenna is capable of recognizing the sector with the maximum gain. When receiving, exactly one sector, which usually is the one chosen by the sensing process, will collect the signals." Based on the simulation results, the authors argue that using directional antennas is able to eliminate the hidden node and exposed node problems and increase the spatial reuse of channel reuse. But in our opinions, it is still not clear if any new type of problem would occur in the presence of directional antennas. There are some interesting topics subject to investigation. For example, how the way directional antennas being utilized will obtain optimal network performance. And how directional antennas can be exploit in multi-channel protocols, etc. Sundaresan and Sivakumar [11] systematically introduce three types of smart antennas, which are switched beam, fully adaptive array, and MIMO links, respectively, and present an unified MAC protocol for ad hoc networks equipped with these antennas. Their work may provide some fundamental ideas for future research in this area. Directional DBTMA (DBTMA-DA) idden/ This is the directional antenna version [2] of the DBTMA protocol. It is covered in the previous section. * Comparison Additional Single/ multi 802.11 Flat/ Cluster omnidirectional/ Hardware xposed nodes channel compatible structure Pros C directional antenna Requirement mainly) Hidden Single No Flat Omni No Simplicity H Single No Flat Omni No Simplicity Ex xposed Single Need modifications Flat Omni No Solves hidden node problem. Fa oth Single Yes Flat Omni No mainly) xposed Simplicity; Easy to implement; H Prevalent in reality. QoS support. Pr oth Single Yes Cluster Omni No oth Single Yes Flat Omni No oth one oth one QoS support. Sa Rate adaptive; Improve throughput Co over 802.11. Single Yes Flat Omni No Implement PCF in networks; QoS support. ad hoc Bo fa Efficient and robust clustering C Need Single Cluster Omni Yes algorithm; No cluster head un modifications needed. Access control based on the Co Need Multi estimation of channel condition; Flat Omni Yes modifications O No contention between ch data/control packets. Need Multi Solve both hidden and exposed Re Flat modifications Omni Yes node problems; Best performance ha oth one one among omni MAC protocols; No m contention between data/control w packets. ch Improve throughput over 802.11; Need Multi Re Flat Omni Yes No contention between modifications Ex data/control packets. Solve both hidden and exposed Need Single Flat Directional Yes node problems; Increase channel Re modifications spatial reuse. Solve both hidden and exposed Need Multi Flat Directional Yes node problems; Increase channel Re modifications spatial reuse. * Paper List with Abstracts 1. IEEE, ANSI/IEEE std 802.11, 1999 Edition (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications <Full Text> 2. Zhuochuan Huang and Chien-Chung Shen, "A comparison study of omnidirectional and directional MAC protocols for ad hoc networks", IEEE Global Telecommunications Conference, Vol. 1 , pp. 57 - 61, Nov. 2002 <Abstract> Traditional MAC protocols used in ad hoc networks employ omnidirectional antennas. Directional antennas have emerged as an alternative due to their capability of spatial reuse, low probability of detection, robustness to jamming, and other beneficial features. We conducted a comparison study of existing directional and omnidirectional MAC protocols by contrasting their features and evaluating their performance under various network load and topology. Specifically we presented rationale for the better performance of some directional antenna based MAC protocols by using the metric of effective spatial reuse, which is also evidenced by the simulation study. <Full Text> 3. Shugong Xu and Tarek Saadawi, "Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?", IEEE Communications Magazine, Vol. 39, No. 6, pp. 130 - 137, June 2001 <Abstract> The IEEE 802.11 MAC protocol is the standard for wireless LANs; it is widely used in testbeds and simulations for wireless multihop ad hoc networks. However, this protocol was not designed for multihop networks. Although it can support some ad hoc network architecture, it is not intended to support the wireless mobile ad hoc network, in which multihop connectivity is one of the most prominent features. In this article we focus on the following question: can the IEEE 802.11 MAC protocol function well in multihop networks? By presenting several serious problems encountered in an IEEE 802.11-based multihop network and revealing the in-depth cause of these problems, we conclude that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks. We thus doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed. <Full Text> 4. Alaa Muqattash and Marwan Krunz, "CDMA-based MAC protocol for wireless ad hoc networks", Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 153 - 164, June 2003 <Abstract> We propose a CDMA-based power controlled medium access protocol for mobile ad hoc networks (MANETs). Unlike previously proposed protocols, ours accounts for the multiple access interference (MAI), thereby addressing the notorious near-far problem that undermines the throughput performance in MANETs. Channel-gain information obtained from overheard RTS and CTS packets over an out-of-band control channel is used to dynamically bound the transmission power of mobile terminals in the vicinity of a receiver. By properly estimating the required transmission power for data packets, the proposed protocol allows for interference-limited simultaneous transmissions to take place in the neighborhood of a receiving terminal. Simulation results indicate that compared to the IEEE 802.11 approach, the proposed protocol achieves a significant increase in network throughput at no additional cost in energy consumption. <Full Text> 5. Gavin Holland, Nitin Vaidya, and Paramvir Bahl, "A rate-adaptive MAC protocol for multi-Hop wireless networks", Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 236 - 251, July 2001 <Abstract> Wireless local area networks (W-LANs) have become increasingly popular due to the recent availability of affordable devices that are capable of communicating at high data rates. These high rates are possible, in part, through new modulation schemes that are optimized for the channel conditions bringing about a dramatic increase in bandwidth efficiency. Since the choice of which modulation scheme to use depends on the current state of the transmission channel, newer wireless devices often support multiple modulation schemes, and hence multiple datarates, with mechanisms to switch between them Users are given the option to either select an operational datarate manually or to let the device automatically choose the appropriate modulation scheme (data rate) to match the prevailing conditions. Automatic rate selection protocols have been studied for cellular networks but there have been relatively few proposals for W-LANs. In this paper we present a rate adaptive MAC protocol called the Receiver-Based AutoRate (RBAR) protocol. The novelty of RBAR is that its rate adaptation mechanism is in the receiver instead of in the sender. This is in contrast to existing schemes in devices like the WaveLAN II [15]. We show that RBAR is better because it results in a more efficient channel quality estimation which is then reflected in a higher overall throughput Our protocol is based on the RTS/CTS mechanism and consequently it can be incorporated into many medium access control protocols including the widely popular IEEE 802.11 protocol. Simulation results of an implementation of RBAR inside IEEE 802.11 show that RBAR performs consistently well. <Full Text> 6. Ruben Merz, Jean-Yves Le Boudec, Jorg Widmer, and Bozidar Radunovic, "A rate-adaptive MAC protocol for low-power ultra-wide band ad-hoc networks", 3rd International Conference on AD-HOC Networks and Wireless (Ad-Hoc Now), pp. 306 - 311, July 2004 <Abstract> Recent theoretical results show that it is optimal to allow interfering sources to transmit simultaneously, as long as they are outside a well-defined exclusion region around a destination, and to adapt the rate to interference. In contrast, interference from inside the exclusion region needs to be controlled. Based on these theoretical findings, we design a fully distributed rate-adaptive MAC protocol for ultra-wide band (UWB) where sources constantly adapt their channel code (and thus their rate) to the level of interference experienced at the destination. To mitigate the interference of sources inside the exclusion region, we propose a specific demodulation scheme that cancels most of the interfering energy. Through simulation we show that we achieve a significant increase in network throughput compared to traditional MAC proposals. <Full Text> 7. Tiantong You and Hossam Hassanein, "Infrastructure-based MAC in wireless mobile ad-hoc networks", 27th Annual IEEE Conference on Local Computer Networks, pp. 821 - 830, November 2002 <Abstract> In this paper, an efficient and on-the fly infrastructure is created using our proposed mobile point coordinator (MPC) protocol. Based on this protocol, we also develop an efficient MAC protocol, namely MPC-MAC. Our MAC protocol extends the IEEE 802.11 standard for use in multihop wireless ad-hoc networks implementing both the DCF and PCF modes of operation. The goal, and also the challenge, is to achieve QoS delivery and priority access for real-time traffic in ad hoc wireless environments while maintaining backward compatibility with the IEEE 802.11 standard. The performance of MPC-MAC is compared to the IEEE 802.11 DCF-based MAC without MPC. Simulation experiments show that in all cases the use of PCF benefits real-time packets by decreasing the average delay and the discard ratio. However, this may come at the expense of increasing the average delay for non-real-time data. On the other hand, the discard ratio for both real-time and non-real-time packets improves with the use of PCF. Therefore, our MPC-MAC outperforms the standard DCF IEEE 802.11 MAC protocol in multi-hop ad-hoc environments. <Full Text> 8. Chunhung Richard Lin and Mario Gerla, "Adaptive clustering for mobile wireless networks", IEEE Journal on Selected Areas in Communications, Vol. 15, No. 7, pp. 1265 - 1275, September 1997 <Abstract> This paper describes a self-organizing, multihop, mobile radio network which relies on a code-division access scheme for multimedia support. In the proposed network architecture, nodes are organized into nonoverlapping clusters. The clusters are independently controlled, and are dynamically reconfigured as the nodes move. This network architecture has three main advantages. First, it provides spatial reuse of the bandwidth due to node clustering. Second, bandwidth can be shared or reserved in a controlled fashion in each cluster. Finally, the cluster algorithm is robust in the face of topological changes caused by node motion, node failure, and node insertion/removal. Simulation shows that this architecture provides an efficient, stable infrastructure for the integration of different types of traffic in a dynamic radio network. <Full Text> 9. Luciano Bononi, Luca Budriesi, Danilo Blasi, Vincenzo Cacace, Luca Casone, Salvatore Rotolo, "A differentiated distributed coordination function MAC protocol for cluster-based wireless ad hoc networks", Proceedings of the 1st ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 77 - 86, 2004 <Abstract> Wireless Mobile Ad Hoc Networks (MANETs) have been defined as infrastructure-less networks, including mobile and fixed nodes relying on peer-to-peer protocols and management. To support more reliable communications, efficient network management and high resources' utilization, distributed clustering protocols have been considered as a solution to introduce some kind of hierarchy in MANETs by means of dynamic and adaptive virtual infrastructures. In clustering schemes, the different node-roles, and respective management tasks, could take advantage by Medium Access Control (MAC) protocols able to differentiate distributed nodes' accesses. To cope with the system dynamics, the MAC itself is required to exploit existing clustering schemes, and to be adaptive to load and clustering variations, with no static access schemes. In this paper we propose and analyze a possible solution for the mutual support of distributed MAC and clustering schemes, named Differentiated Distributed Coordination Function (DDCF). The DDCF scheme is based on the IEEE 802.11 DCF access scheme, and inspired to the IEEE 802.11e design. Unlike IEEE802.11e, whose focus is to support Quality of Service (QoS) on the prioritized frame-flows basis, the focus of the DDCF is to implement nodes differentiation based on the node roles, which have been assigned by the upper-layer clustering scheme. Extensive, still preliminary, performance evaluation shown that the proposed DDCF access scheme can adaptively exploit the roles of cluster nodes, to support heterogeneous and differentiated MAC access needs. <Full Text> 10. Yunli Chen, Qing-An Zeng and Dharma P. Agrawal, "Performance evaluation for IEEE 802.11e enhanced distributed coordination function", Wireless Communications and Mobile Computing, Vol. 4, pp. 639–653, 2004 <Abstract> The IEEE 802.11e working group aims to enhance the current 802.11 medium access control (MAC) to support integrated data and voice (or video) communications. Till now, a draft of the IEEE 802.11e enhanced distributed coordination function (EDCF) has been proposed. In the literature, there is very limited analysis about EDCF since it is a new protocol, and most related work are only confined to simulation or saturation state. In this paper, we evaluate the performance of EDCF by dividing the traffic into two groups, namely real-time packets and non-realtime packets, and use an analytical model to quantify the performance of both IFS priority and contention window (CW) priority in the EDCF. In our analysis, we assume that the traffic arrival is a Poisson process. We provide a queue model for EDCF. Since there are multiple stations contending for one channel in the system, the queue model for EDCF cannot be a regular M/G/1 model. We redefine the service time and the waiting time so that we can still use M/G/1 model in the analysis. To validate the accuracy of our analytical results, we have done extensive simulations and we observed that EDCF does provide service differentiation between different traffic categories. But due to the inherent contention characteristic of carrier sense multiple access with collision avoidance (CSMA/CA) MAC protocol, the delay cannot be guaranteed, even for the highest priority traffic. A lot more work needs to be done for the MAC protocol to effectively support service differentiation in the future. <Full Text> 11. Karthikeyan Sundaresan, Raghupathy Sivakumar, "A unified MAC layer framework for ad-hoc networks with smart antennas", Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, pp. 244 - 255, 2004 <Abstract> Smart antennas represent a broad variety of antennas that differ in their performance and transceiver complexity. The superior capabilities of smart antennas, however, can be leveraged only through appropriately designed higher layer network protocols, including at the medium access control (MAC) layer. Although several related works have considered such tailored protocols, they do so in the context of specific antenna technologies. In this paper, we explore the possibility for a unified approach to medium access control in ad-hoc networks with smart antennas. We first present a unified representation of the PHY layer capabilities of the different types of smart antennas, and their relevance to MAC layer design. We then define a unified MAC problem formulation, and derive unified MAC algorithms from the formulation. Finally, using the algorithms developed, we investigate the relative performance trade-offs of the different technologies under varying network conditions. <Full Text> 12. Tianbo Kuang, Carey Williamson, "A bidirectional multi-channel MAC protocol for improving TCP performance on multihop wireless ad hoc networks", Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 301 - 310, 2004 <Abstract> In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To address these problems, the ready-to-send and clear-to-send (RTS/CTS) dialogue has been proposed in the literature. However, MAC schemes using only the RTS/CTS dialogue cannot completely solve the hidden and the exposed terminal problems, as pure "packet sensing" MAC schemes are not safe even in fully connected networks. We propose a new MAC protocol, termed the dual busy tone multiple access (DBTMA) scheme. The operation of the DBTMA protocol is based on the RTS packet and two narrow-bandwidth, out-of-band busy tones. With the use of the RTS packet and the receive busy tone, which is set up by the receiver, our scheme completely solves the hidden- and the exposed-terminal problems. The busy tone, which is set up by the transmitter, provides protection for the RTS packets, increasing the probability of successful RTS reception and, consequently, increasing the throughput. This paper outlines the operation rules of the DBTMA scheme and analyzes its performance. Simulation results are also provided to support the analytical results. It is concluded that the DBTMA protocol is superior to other schemes that rely on the RTS/CTS dialogue on a single channel or to those that rely on a single busy tone. As a point of reference, the DBTMA scheme out-performs FAMA-NCS by 20-40% in our simulations using the network topologies borrowed from the FAMA-NCS paper. In an ad hoc network with a large coverage area, DBTMA achieves performance gain of 140% over FAMA-NCS and performance gain of 20% over RI-BTMA. <Full Text> 13. Zygmunt J. Haas, Jing Deng, "Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks", IEEE Transactions on Communications, June 2002,Vol. 50, No. 6, pp. 975 - 985 <Abstract> The TCP protocol often suffers from performance problems in conventional single-channel multihop wireless ad hoc networks. The problems arise from hidden node and exposed node issues, which can lead to channel contention in the forward direction between TCP DATA packets that are part of the same TCP flow control window, as well as contention between TCP DATA and TCP ACK packets flowing in opposite directions. In this paper, we propose and evaluate a novel bidirectional multi-channel MAC protocol designed to improve TCP performance over a multihop wireless network. The protocol uses multiple transmission channels at the physical layer to reduce TCP DATA-DATA contention, and bidirectional RTS/CTS channel reservations to reduce TCP DATA-ACK collisions. With four channels, simulation results for static multihop networks show TCP throughput gains of 50% to 180%, compared to a conventional IEEE 802.11 MAC protocol. Fairness is also improved with our protocol, since contention is confined to a short handshake period on the control channel. <Full Text> 14. Jing Deng, Ben Liang, Pramod K. Varshney, "Tuning the Carrier Sensing Range of IEEE 802.11 MAC", Global Telecommunications Conference, December 2004, Vol. 5,pp. 2987 - 2991 <Abstract> We investigate the effects of the carrier sensing range of the IEEE 802.11 Multiple Access Control (MAC) scheme in this paper. Contrary to a simple and inaccurate cut-off circular collision model that is commonly used, we employ a more accurate collision model to realistically simulate MAC schemes in ad hoc networks. We argue that the carrier sensing range is a tunable parameter that can significantly affect the MAC performance in multihop ad hoc networks. An optimal carrier sensing range should balance the trade-off between the amount of spatial frequency reuse and the possibility of packet collisions. A reward formulation for the optimization of the carrier sensing range is presented. Extensive simulation results are provided to substantiate our study. <Full Text> 15. J. J. Garcia-Luna-Aceves, Chane L. Fullmer, "Floor acquisition multiple access (FAMA) in single-channel wireless networks", Mobile Networks and Applications, October 1999, Vol. 4, No. 3, pp. 157 - 174 <Abstract> The FAMA-NCS protocol is introduced for wireless LANs and ad-hoc networks that are based on a single channel and asynchronous transmissions (i.e., no time slotting). FAMA-NCS (for floor acquisition multiple access with non-persistent carrier sensing) guarantees that a single sender is able to send data packets free of collisions to a given receiver at any given time. FAMA-NCS is based on a three-way handshake between sender and receiver in which the sender uses non-persistent carrier sensing to transmit a request-to-send (RTS) and the receiver sends a clear-to-send (CTS) that lasts much longer than the RTS to serve as a “busy tone” that forces all hidden nodes to back off long enough to allow a collision-free data packet to arrive at the receiver. It is shown that carrier sensing is needed to support collision-free transmissions in the presence of hidden terminals when nodes transmit RTSs asynchronously. The throughput of FAMA-NCS is analyzed for single-channel networks with and without hidden terminals; the analysis shows that FAMA-NCS performs better than ALOHA, CSMA, and all prior proposals based on collision avoidance dialogues (e.g., MACA, MACAW, and IEEE 802.11 DFWMAC) in the presence of hidden terminals. Simulation experiments are used to confirm the analytical results. <Full Text> 16. Phil Karn, "MACA - A new channel access method for packet radio", ARRL/CRRL Amateur Radio 9th computer Networking Conference, 1990, pp. 134 140 <Abstract> The existing Carrier Sense Multiple Access (CSMA) method widely used in amateur packet radio on shared simplex packet radio channels frequently suffers from the well-known "hidden terminal problem" and the less well known but related problem of the "exposed terminal." This paper proposes a new scheme, Multiple Access with Collision Avoidance (MACA), that could greatly relieve these problems. MACA can also be easily extended to provide automatic transmitter power control. This could increase the carrying capacity of a channel substantially. <Full Text> 17. Vaduvur Bharghavan, Alan Demers, Scott Shenker, Lixia Zhang, "MACAW: a media access protocol for wireless LAN's", Proceedings of the conference on Communications architectures, protocols and applications, 1994, pp. 210 - 225 <Abstract> In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols for a single channel wireless LAN being developed at Xerox Corporation's Palo Alto Research Center. We start with the MACA media access protocol first proposed by Karn [9] and later refined by Biba [3] which uses an RTS-CTS-DATA packet exchange and binary exponential back-off. Using packet-level simulations, we examine various performance and design issues in such protocols. Our analysis leads to a new protocol, MACAW, which uses an RTS-CTS-DS-DATA-ACK message exchange and includes a significantly different backoff algorithm. <Full Text> 18. Cheng-shong Wu and Victor O.K. Li, "Receiver-initiated busy-tone multiple access in packet radio networks", Proceedings of the ACM workshop on Frontiers in computer communications technology, 1987, pp. 336 - 342 <Abstract> The ALOHA and Carrier Sense Multiple Access (CSMA) protocols have been proposed for packet radio networks (PRN). However, CSMA/CD which gives superior performance and has been successful applied in local area networks cannot be readily applied in PRN since the locally generated signals will overwhelm a remote transmission, rendering it impossible to tell whether a collision has occurred or not. In addition, CSMA and CSMA/CD suffer from the “hidden node” problem in a multihop PRN. In this paper, we develop the Receiver-Initiated Busy-Tone Multiple Access Protocol to resolve these difficulties. Both fully connected and multihop networks are studied. The busy tone serves as an acknowledgement and prevents conflicting transmissions from other nodes, including “hidden nodes”. <Full Text> 19. Young-Bae KO, Vinaychandra Shankarkumar, and Nitin H. Vaidya, "Medium access control protocols using directional antennas in ad hoc networks", Mobile Networks and Applications, IEEE INFOCOM, 2000, Vol. 1, pp. 13 - 21 <Abstract> Using directional antennas can be beneficial for wireless ad hoc networks consisting of a collection of wireless hosts. To best utilize directional antennas, a suitable medium access control (MAC) protocol must be designed. Current MAC protocols, such as the IEEE 802.11 standard, do not benefit when using directional antennas, because these protocols have been designed for omnidirectional antennas. In this paper, we attempt to design new MAC protocols suitable for ad hoc networks based on directional antennas. <Full Text> 20. A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto, "A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas", Wireless Communications and Networking Conference, Vol. 3, 2000, pp. 1214 - 1219 <Abstract> We propose a medium access control (MAC) protocol for an ad hoc network of mobile wireless terminals that are equipped with multiple directional antennas. Use of directional antennas in ad hoc networks can largely reduce the radio interference, thereby improving the packet throughput. However, the main problem of using directional antennas in such networks is due to the dynamic nature of the network caused by frequent node movements. This gives rise to problems such as locating and tracking during random channel access. The MAC protocol presented in this paper proposes a solution to these problems without the help of additional hardware. Results obtained from detailed computer simulations demonstrate the performance improvement obtained with the proposed scheme. <Full Text> 21. Zhuochuan Huang, Chien-Chung Shen, Chavalit Srisathapornphat, and Chaiporn Jaikaeo, "A busy-tone based directional MAC protocol for ad hoc networks", IEEE MILCOM, 2002, Vol. 2, pp. 1233 - 1238 <Abstract> In mobile wireless ad hoc networking environments, such as the future combat system (FCS), the shared wireless communication medium is an inherently limited resource and is collision prone. In this paper, we propose to adapt the dual busy tone multiple access (DBTMA) protocol for use with directional antennas, which further increases effective channel capacity. In contrast to other directional antenna based MAC protocols, our protocol, termed DBTMA/DA, is capable of reserving channel capacity in finer grain without relying on extra locationing support. A simulation study is performed to demonstrate the better network performance of DBTMA/DA over DBTMA and the IEEE 802.11a MAC protocols. <Full Text> 22. Kaixin Xu, Mario Ger1a, and Sang Bae, "How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks", IEEE Global Telecommunications Conference, 2002, Vol. 1, pp. 72 - 76 <Abstract> IEEE 802.11 MAC mainly relies on two techniques to combat interference: physical carrier sensing and RTS/CTS handshake (also known as "virtual carrier sensing"). Ideally, the RTS/CTS handshake can eliminate most interference. However, the effectiveness of RTS/CTS handshake is based on the assumption that hidden nodes are within transmission range of receivers. In this paper, we prove using analytic models that in ad hoc networks, such an assumption cannot hold due to the fact that power needed for interrupting a packet reception is much lower than that of delivering a packet successfully. Thus, the "virtual carrier sensing" implemented by RTS/CTS handshake cannot prevent all interference. Physical carrier sensing can complement this in some degree. However, since interference happens at receivers, while physical carrier sensing is detecting transmitters (the same problem causing the hidden terminal situation), physical carrier sensing cannot help much, unless a very large carrier sensing range is adopted, which is limited by the antenna sensitivity. We investigate how effective is the RTS/CTS handshake in terms of reducing interference. We show that in some situations, the interference range is much larger than transmission range, where RTS/CTS cannot function well. Then, a simple MAC layer scheme is proposed to solve this problem. Simulation results verify that our scheme can help IEEE 802.11 resolve most interference caused by large interference range. <Full Text> 23. Huei-Jiun Ju, Izhak Rubin, and Yen-Cheng Kuan, "An adaptive RTS/CTS control mechanism for IEEE 802.11 MAC protocol", IEEE Vehicular Technology Conference, 2003, Vol. 2, pp. 1469 - 1473 <Abstract> In this paper, we study the impact of using or disengaging the RTS/CTS dialogue in IEEE 802.11 DCF MAC protocol under the fact that carrier sensing, transmission and interference ranges are distinctively different. The resulting throughput performance features of a linear topology network configuration are demonstrated when applying constant bit rate (CBR) UDP as well as TCP type traffic flows. Based on these results, we propose a new RTS/CTS control mechanism. Under our scheme, a terminal node decides dynamically and individually whether to use a RTS/CTS dialogue for the transmission of its current data packet. We show that this new mechanism yields distinctive performance improvements. <Full Text> 24. Fouad A. Tobagi, Leonard Kleinrock, "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics", IEEE Transactions on Communications, 1975, Vol. 23, No. 12, pp. 1400 - 1416 <Abstract> Radio communication is considered as a method for providing remote terminal access to computers. Digital byte streams from each terminal are partitioned into packets (blocks) and transmitted in a burst mode over a shared radio channel. When many terminals operate in this fashion, transmissions may conflict with and destroy each other. A means for controlling this is for the terminal to sense the presence of other transmissions; this leads to a new method for multiplexing in a packet radio environment: carrier sense multiple access (CSMA). Two protocols are described for CSMA and their throughput-delay characteristics are given. These results show the large advantage CSMA provides as compared to the random ALOHA access modes. <Full Text> 25. Fouad A. Tobagi, Leonard Kleinrock, "Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution", IEEE Transactions on Communications, 1975, Vol. 23, No. 12, pp. 1417 - 1433 <Abstract> We consider a population of terminals communicating with a central station over a packet-switched multiple-access radio channel. The performance of carrier sense multiple access (CSMA) [1] used as a method for multiplexing these terminals is highly dependent on the ability of each terminal to sense the carrier of any other transmission on the channel. Many situations exist in which some terminals are "hidden" from each other (either because they are out-of-sight or out-of-range). In this paper we show that the existence of hidden terminals significantly degrades the performance of CSMA. Furthermore, we introduce and analyze the busy-tone multiple-access (BTMA) mode as a natural extension of CSMA to eliminate the hidden-terminal problem. Numerical results giving the bandwidth utilization and packet delays are shown, illustrating that BTMA with hidden terminals performs almost as well as CSMA without hidden terminals. <Full Text> 26. N. Abramson, “The ALOHA System-Another alternative for computer communications”, 1970 Fall Joint Comput. Conf., AFIPS Press, 1970, vol. 37, pp. 281-285. Paper List only 1. IEEE, ANSI/IEEE std 802.11, 1999 Edition (R2003), Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications 2. Zhuochuan Huang and Chien-Chung Shen, "A comparison study of omnidirectional and directional MAC protocols for ad hoc networks", IEEE Global Telecommunications Conference, Vol. 1 , pp. 57 - 61, Nov. 2002 3. Shugong Xu and Tarek Saadawi, "Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?", IEEE Communications Magazine, Vol. 39, No. 6, pp. 130 - 137, June 2001 4. Alaa Muqattash and Marwan Krunz, "CDMA-based MAC protocol for wireless ad hoc networks", Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 153 - 164, June 2003 5. Gavin Holland, Nitin Vaidya, and Paramvir Bahl, "A rate-adaptive MAC protocol for multi-Hop wireless networks", Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 236 - 251, July 2001 6. Ruben Merz, Jean-Yves Le Boudec, Jorg Widmer, and Bozidar Radunovic, "A rate-adaptive MAC protocol for low-power ultra-wide band ad-hoc networks", 3rd International Conference on AD-HOC Networks and Wireless (Ad-Hoc Now), pp. 306 - 311, July 2004 7. Tiantong You and Hossam Hassanein, "Infrastructure-based MAC in wireless mobile ad-hoc networks", 27th Annual IEEE Conference on Local Computer Networks, pp. 821 - 830, November 2002 8. Chunhung Richard Lin and Mario Gerla, "Adaptive clustering for mobile wireless networks", IEEE Journal on Selected Areas in Communications, Vol. 15, No. 7, pp. 1265 - 1275, September 1997 9. Luciano Bononi, Luca Budriesi, Danilo Blasi, Vincenzo Cacace, Luca Casone, Salvatore Rotolo, "A differentiated distributed coordination function MAC protocol for cluster-based wireless ad hoc networks", Proceedings of the 1st ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp. 77 - 86, 2004 10. Yunli Chen, Qing-An Zeng and Dharma P. Agrawal, "Performance evaluation for IEEE 802.11e enhanced distributed coordination function", Wireless Communications and Mobile Computing, Vol. 4, pp. 639–653, 2004 11. Karthikeyan Sundaresan, Raghupathy Sivakumar, "A unified MAC layer framework for ad-hoc networks with smart antennas", Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing, pp. 244 - 255, 2004 12. Tianbo Kuang, Carey Williamson, "A bidirectional multi-channel MAC protocol for improving TCP performance on multihop wireless ad hoc networks", Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 301 - 310, 2004 13. Zygmunt J. Haas, Jing Deng, "Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks", IEEE Transactions on Communications, June 2002,Vol. 50, No. 6, pp. 975 - 985 14. Jing Deng, Ben Liang, Pramod K. Varshney, "Tuning the Carrier Sensing Range of IEEE 802.11 MAC", Global Telecommunications Conference, December 2004, Vol. 5,pp. 2987 - 2991 15. J. J. Garcia-Luna-Aceves, Chane L. Fullmer, "Floor acquisition multiple access (FAMA) in single-channel wireless networks", Mobile Networks and Applications, October 1999, Vol. 4, No. 3, pp. 157 - 174 16. Phil Karn, "MACA - A new channel access method for packet radio", ARRL/CRRL Amateur Radio 9th computer Networking Conference, 1990, pp. 134 140 17. Vaduvur Bharghavan, Alan Demers, Scott Shenker, Lixia Zhang, "MACAW: a media access protocol for wireless LAN's", Proceedings of the conference on Communications architectures, protocols and applications, 1994, pp. 210 - 225 18. Cheng-shong Wu and Victor O.K. Li, "Receiver-initiated busy-tone multiple access in packet radio networks", Proceedings of the ACM workshop on Frontiers in computer communications technology, 1987, pp. 336 - 342 19. Young-Bae KO, Vinaychandra Shankarkumar, and Nitin H. Vaidya, "Medium access control protocols using directional antennas in ad hoc networks", Mobile Networks and Applications, IEEE INFOCOM, 2000, Vol. 1, pp. 13 - 21 20. A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto, "A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas", Wireless Communications and Networking Conference, Vol. 3, 2000, pp. 1214 - 1219 21. Zhuochuan Huang, Chien-Chung Shen, Chavalit Srisathapornphat, and Chaiporn Jaikaeo, "A busy-tone based directional MAC protocol for ad hoc networks", IEEE MILCOM, 2002, Vol. 2, pp. 1233 - 1238 22. Kaixin Xu, Mario Ger1a, and Sang Bae, "How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks", IEEE Global Telecommunications Conference, 2002, Vol. 1, pp. 72 - 76 23. Huei-Jiun Ju, Izhak Rubin, and Yen-Cheng Kuan, "An adaptive RTS/CTS control mechanism for IEEE 802.11 MAC protocol", IEEE Vehicular Technology Conference, 2003, Vol. 2, pp. 1469 - 1473 24. Fouad A. Tobagi, Leonard Kleinrock, "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics", IEEE Transactions on Communications, 1975, Vol. 23, No. 12, pp. 1400 - 1416 25. Fouad A. Tobagi, Leonard Kleinrock, "Packet Switching in Radio Channels: Part II--The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution", IEEE Transactions on Communications, 1975, Vol. 23, No. 12, pp. 1417 - 1433 26. N. Abramson, “The ALOHA System-Another alternative for computer communications”, 1970 Fall Joint Comput. Conf., AFIPS Press, 1970, vol. 37, pp. 281-285.