A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks

T Korakis, G Jakllari, L Tassiulas - … on Mobile ad hoc networking & …, 2003 - dl.acm.org
MAC protocolMAC protocol that adapts directional antennas in ad-hoc networks in Section
4. Finally, in section 5 we compare the performance of our protocol with other MAC protocols

A distributed MAC protocol for full duplex radio

S Goyal, P Liu, O Gurbuz, E Erkip… - … Asilomar conference on …, 2013 - ieeexplore.ieee.org
full duplex radios in a wireless local area network (WLAN) is explored. Different scenarios in
which the full duplex transmission can be exploited … designing a MAC protocol that enables …

An adaptive energy-efficient MAC protocol for wireless sensor networks

T Van Dam, K Langendoen - … of the 1st international conference on …, 2003 - dl.acm.org
… T-MAC protocol uses even less energy than S-MAC is due to the fact that we tested the S-MAC
protocol … For the T-MAC protocol, we used overhearing avoidance, the full-buffer priority …

A MAC protocol for opportunistic spectrum access in cognitive radio networks

L Le, E Hossain - 2008 IEEE wireless communications and …, 2008 - ieeexplore.ieee.org
… networks which allow unlicensed users to exploit spectrum opportunities in licensed frequency
… This full text paper was peer reviewed at the direction of IEEE Communications Society …

A comprehensive review on energy harvesting MAC protocols in WSNs: Challenges and tradeoffs

HHR Sherazi, LA Grieco, G Boggia - Ad Hoc Networks, 2018 - Elsevier
… the design of the MAC protocol even more challenging. To … pros and cons of key MAC protocols
for EH-WSNs with a special … , provides design guidelines for MAC protocols in EH-WSNs, …

Wireless MAC processors: Programming MAC protocols on commodity hardware

I Tinnirello, G Bianchi, P Gallo, D Garlisi… - 2012 Proceedings …, 2012 - ieeexplore.ieee.org
… executing a finite state machine able to exploit and compose the sequence of commands …
Thus, an eventually full-custom MAC protocol can be programmed by simply injecting (or …

EM-MAC: A dynamic multichannel energy-efficient MAC protocol for wireless sensor networks

L Tang, Y Sun, O Gurewitz, DB Johnson - Proceedings of the twelfth ACM …, 2011 - dl.acm.org
… [9], such that the LCG will have a full period (ie, full cycle) for all seed values. The generation …
time-synchronization packets, only exploiting the timestamps embedded in prediction states…

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

YW Law, M Palaniswami, LV Hoesel… - ACM Transactions on …, 2009 - dl.acm.org
… with the full citation. … exploiting the semantics of the data link layer and show the results
quantitatively. The fact that our attacks are applicable to three representative MAC protocols

TMMAC: An energy efficient multi-channel MAC protocol for ad hoc networks

J Zhang, G Zhou, C Huang, SH Son… - 2007 IEEE …, 2007 - ieeexplore.ieee.org
exploitfull advantage of both multiple channels and TDMA. The main contributions of this
work can be summarized as follows: • We present a TDMA based multi-channel MAC protocol

Survey on low power real-time wireless MAC protocols

P Bartolomeu, M Alam, J Ferreira, J Fonseca - Journal of Network and …, 2016 - Elsevier
… The ANT chipsets encapsulate the full complexity of the wireless protocol, allowing resource
… , thus increasing its exploitation and maintenance costs. Finally, being a custom designed …