You are on page 1of 15

1

Medium Access Control in Mobile Ad Hoc


Networks: Challenges and Solutions
Hongqiang Zhai, Jianfeng Wang, Xiang Chen, and Yuguang Fang
Department of Electrical & Computer Engineering
University of Florida, Gainesville, Florida 32611-6130
Tel: (352) 846-3043, Fax: (352) 392-0044
E-mail: {zhai@ecel., jfwang@, xchen@ecel., and fang@ece.}ufl.edu

Abstract— Mobile ad hoc networks (MANETs) are useful in en- intensive computation. Last, but not least, MANETs by nature
vironment where fixed network infrastructure is unavailable. To are self-organized, self-controlled, and distributed. In other
function normally, MANETs demand an efficient and distributed words, there is no centralized controller that has perfect
medium access control (MAC) protocol. However, characteristics
of MANETs such as radio link vulnerability, mobility, limited knowledge of all the nodes in the network. Instead, each node
power pose great challenges on MAC design. can only have incomplete or sometimes skewed view of the
This paper surveys the recent advances in MAC design for network. As a result, it has to make decisions with imperfect
MANETs. we first identify the challenges that are facing MAC in information. Due to all these hurdles posed by MANETs,
MANETs. Then we discuss the proposed MAC schemes according achieving simple, efficient, fair, and energy-efficient medium
to their design goals, focusing on some critical design issues and
tradeoffs. Finally, we point out some future research directions. access control, while highly desirable, is challenging.
Recently, a tremendous number of MAC schemes have been
Index Terms— Medium access control (MAC), mobile ad hoc
networks (MANETs), quality of service (QoS), fairness, energy-
proposed for MANETs to address various relevant issues. This
efficiency. paper is aimed to provide a comprehensive survey of these
schemes, and discuss some critical issues and tradeoffs in
designing MAC protocols to deliver good performances in
I. I NTRODUCTION
MANETs.
With the rapid development in wireless communication The rest of this paper is organized as follows. Section
technologies and the proliferation of mobile communication II presents the challenges that are facing MAC design and
and computing devices like cell phones, PDAs or laptops, discusses how they impact the performance of MANET. Next,
mobile ad hoc networks (MANETs) has emerged as an impor- Section III discusses in detail the proposed MAC schemes
tant part of the envisioned future ubiquitous communication according to their design goals. Finally, Section IV concludes
because they do not require infrastructure support and can be this paper and gives several future research directions.
quickly deployed with low cost. MANETs are finding a variety
of applications such as disaster rescue, battlefield communi-
cations, inimical environment monitoring, and collaborative II. C HALLENGES AND D ESIGN I SSUES
computing. While MANETs exhibit unique advantages compared to
Since all the mobile nodes in MANETs use the same one-hop wireless networks such as cellular networks and
frequency spectrum (or physical channel), medium access wireless local area networks (WLANs), they do impose several
control (MAC) plays an important role in coordinating channel challenges and design issues on MAC protocol design. The
access among the nodes so that information gets through from first and most serious challenge is that centralized controlling
one node to another. Although various MAC schemes have usually is not available in MANET due to the lack of in-
been extensively studied in the contexts of wired networks, frastructure support. Without perfect coordination, collisions
they cannot be directly applied to the contexts of MANETs, could take place when several nodes simultaneously access
which have several unique characteristics that well distinguish the shared medium. They may also result from transmissions
themselves from their wired counterparts. First, wireless chan- that are multiple-hop away. Secondly, due to hardware con-
nels are not as reliable as wired ones, suffering from path loss, straints, a node can not immediately detect collisions during
fading and interference. Also, the usable bandwidth is limited. its transmission, which leads to channel inefficiency. Thirdly,
Second, by its name, a MANET is composed of a number of as every node in the network is mobile, the network topology
nodes that can move around. Consequently, the network topol- may change from time to time. Accordingly, each node may
ogy may experience continuous change and cause frequent experience different degree of channel contention and colli-
route breakages and re-routing activity. Third, in MANETs, sion. At the same time, the attendant route changes also affect
mobile nodes are typically computationally limited and battery the interaction between the MAC layer and higher layers. Fi-
powered, which means they cannot afford complex and energy nally, several important issues like energy efficiency, fairness,
This work was supported in part by the U.S. Office of Naval Research under or quality of service (QoS) provision need to be carefully
Young Investigator Award N000140210464 and under grant N000140210554. considered when designing MAC protocols for MANETs.
2

multiple forwardings in order to maximize the aggregate


throughput in MANETs. In fact, the optimal transmission
range depends on the number of nodes and their location
and moving speed and hence is difficult to achieve due to
F A B C D E
the dynamic and distributed nature of MANETs.
Exposed terminal problem is another factor influencing the
spatial reuse. An exposed terminal is the one that senses
the transmission of a transmitter and can not interfere with
Fig. 1. Carrier Sensing Range and Transmission Range. The small and the reception at the receiver. However, it is not allowed to
large circles denote the transmission and sensing ranges of node A, B, and transmit simply because it senses a busy medium, which leads
C, respectively.
to bandwidth under-utilization. In Fig. 1, node F is the exposed
terminal of A when A is transmitting to B. F senses A’s
transmission and thus is forced to keep silence, even though F
In this section, we discuss in detail the challenges from can transmit to other nodes outside A’s sensing range without
layered perspective as well as several important design issues. interfering B’s reception.
The hidden terminal problem and exposed terminal problem
are coupled with each other in multihop wireless networks.
A. Medium Access to Shared Medium
It is common that bidirectional packet exchange between a
The primary goal of MAC is to coordinate the channel transmission pair for a DATA packet transmission, such as
access among multiple nodes to achieve high channel DATA/ACK or RTS/CTS/DATA/ACK, is used in the IEEE
utilization. In other words, The coordination of channel 802.11 MAC protocol. In the bidirectional transmission, the
access should minimize or eliminate the incidence of exposed node of one of the transmitter-receiver pair might well
collisions and maximize spatial reuse at the same time. be the hidden node when the roles of transmitter and receiver
are switched, and vice versa. For example, in Fig. 1, node F
1) Collisions: Collisions come from two aspects in is also a hidden terminal of node B when B responds to A
MANETs. They may occure due to simultaneous transmissions with CTS or ACK packets, while originally F is an exposed
by two or more nodes in a certain range where their signals terminal of node A when A is transmitting RTS or DATA to
collide and interfere with each other. Obviously, the more the B. Thus these two problems can significantly lower the spatial
active nodes in the range of a transmitter-receiver pair, the reuse.
more severe the collisions observed.
On the other hand, collisions can result from hidden ter- B. Physical Layer Issues
minals. A hidden terminal is the one that can neither sense
1) Capture Effect: In wireless networks, in order for a node
the transmission of a transmitter nor correctly receive the
to correctly receive the transmission from another node, say
reservation packet from its corresponding receiver. In the
node i, SINR must exceed a certain threshold β, i.e.,
IEEE 802.11 MAC protocol [1], the reservation packet is a
CTS (clear-to-send) packet which advertises the reservation Pi
SIN Ri = P ≥ β, (1)
of the channel. A hidden terminal node can interfere with an Pk + N
ongoing transmission by transmitting at the same time. For k6=i

example, in Fig. 1, node D is a hidden terminal when node where Pi is the received signal power and β is referred to
A is transmitting DATA packets to node B. D’s transmission as capture threshold (when the power level of noise N is
will interfere with B’s reception because signal to noise plus small). That is, a data packet can be received successfully
interference ratio (SINR) at B is not large enough for correct if its instantaneous power is at least β times the instantaneous
decoding. Here, the transmission range of a transmitter refers joint interference power. This fact is called capture effect.
to a range within which any node can correctly decode the Current carrier sense strategy such as that adopted in
received signal if there is no interference. And the sensing the IEEE 802.11 MAC protocol requires a node to defer
range of a transmitter refers to a range within which any node its transmission whenever the channel is determined busy,
can sense the received signal, whose power level exceeds a despite the fact that this node’s transmission may not impair
certain value referred to as sensing threshold. some other ongoing transmissions due to the capture effect.
Clearly, channel utilization will be improved if capture effect
2) Spatial Reuse: To achieve high channel utilization, MAC can be utilized. However, it is difficult to design MAC
also needs to maximize the spatial reuse. One way is to protocols that incorporate capture effect in MANETs because
reduce the transmission power to allow more simultaneous it demands careful coordination of new transmissions which
transmissions in the networks. However, smaller transmission would otherwise increase joint interference power and thus
range means more transmission hops each packet needs to inviolate Equation 1.
go through from source to destination. This, in turn, leads to
heavier traffic at each node and could counteract the advantage 2) Variable Channel Condition: Unlike wired channels that
of increased spatial reuse. Several papers [2]–[4] have already are stationary and predictable, wireless channels are time-
shown that there is a tradeoff between the spatial reuse and varying, depending on the spatial location of transmitting and
3

receiving nodes, the characteristics of surrounding environ- when designing MAC protocols, one should bear in mind the
ment, and movements of surrounding objects as well as mobile undesirable interaction between MAC and congestion con-
nodes. Wireless channels are also location dependent. For trol algorithms, such as TCP’s end-to-end congestion control
instance, the channel gain is different for each transmitter and mechanism.
receiver pair as long as the stations are not extremely close to
each other. D. Energy Efficiency
Since the received power signal strength is determined
by channel gain as well as transmission power, given the In wireless networks, energy efficiency is always a critical
bit error rate, the maximum achievable channel bit rate also issue due to a limited battery life. First, MAC protocols should
varies with time. Consequently, corresponding to variable reduce the number of collided packets as many as possible,
channel conditions, variable transmission data rate can be and hence reduce the power consumption wasted in collisions.
used. To maximize the channel utilization, MAC protocols Second, only just enough power should be used to achieve
need to exploit the channel adaptive transmission. Typically, a certain data rate for each transmission while maintaining
when SINR is sufficiently high, higher data rates than the good coordinations among all the nodes. In addition, less
base rate should be used for transmission and otherwise lower transmission power can also reduce interference to other
data rate should be used. ongoing transmissions and improve the spatial reuse.

3) New Physical Layer Techniques: The recent advance- E. Fairness


ment of wireless communications, such as directional antenna, Unfairness could result from different opportunities of chan-
multiple input multiple output (MIMO) Systems, and space nel access. In MANETs, there are two major sources for
time coding, offers a variety of advantages such as low unequal channel access opportunities: the backoff mechanism
transmission power and high data rate. In response, MAC and location. While the backoff mechanism is widely used in
mechanisms are supposed to take advantage of these new MAC protocols for MANETs to reduce collisions and achieve
techniques to further improve efficiency or reduce transmission high channel efficiency, it always favors the node that just suc-
power. For example, directional transmission results in less cessfully seized the channel. As a result, different nodes may
interference to other transmissions and hence makes it possible use different backoff window, leading to different transmission
to enhance the spatial reuse. However, it is worth noting probabilities and consequently short-term unfairness as well
that MAC protocols have to be elaborately designed to make as long-term unfairness. Meanwhile, since nodes’ location
sure that directional transmission does not affect efficient and traffic might not be uniformly distributed in MANETs, a
negotiations for successful transmission between a transmitter node’s location also influence its channel access opportunity.
and a receiver as required in an ad hoc environment. Nodes with less channel contention from their neighboring
nodes can seize the channel more likely than others. Note that
C. Interactions with Higher Layers to achieve fairness among all nodes, the network’s aggregate
throughput, namely, efficiency, often has to be sacrificed.
The interaction between the MAC layer and higher layers
in ad hoc networks are much more complicated than in wired
networks mainly for two reasons. First, current routing algo- F. Quality of Service (QoS)
rithms in ad hoc networks determine a broken link whenever With the proliferation of Internet multimedia services, such
the (re)transmissions continuously fail over this link for a as voice over IP and streaming video, mobile devices in
certain number of times. However, transmission failures may MAENTs are expected to support these multimedia services
well result from MAC collisions that are very common in a with QoS guarantee. Since multimedia services typically have
contention-based MANET. False reports of link/route failures, strict end-to-end delay and delay variation requirements, QoS
in turn, require routing algorithms to conduct an unnecessary provisioning will not be easy given that MANETs are char-
re-routing process, which will interrupt the ongoing traffic flow acterized by their distributed and bandwidth-limited channel
and greatly degrade the end-to-end throughput. Second, net- access, where medium contentions and collisions are common.
work congestion and medium contentions are closely coupled
in MANETs. In wired networks, when congestion happens III. MAC P ROTOCOLS FOR MANET S
and packets build up in the queue, the data rate of the link In this section, we will first describe several basic compo-
between an upstream node and its downstream node is not nents of contention-based MAC protocols. Then, we present
affected. However, this is not the case in MANETs. Since some solutions to the classical hidden terminal and exposed
the channel is shared by all nodes in a neighborhood, the terminal problem over MANETs. Finally, we discuss some
congestion is not only a phenomenon related to one pair of representative MAC protocols according to their design goals.
transmitting-receiving nodes, but also one to all nodes in the
neighborhood. When congestion happens and queues build
up, contentions and collisions will become severe, leading to A. Basic Design Components of MAC Protocol over MANETs
significant decrease in the data rate for any transmission pair As mentioned earlier, collisions can be quickly detected
in the neighborhood and the aggregate data rate. Worse yet, during the course of transmission in wired networks, such as
the decreased throughput further aggravate congestion. Thus, the collision detection technique used in Ethernet. In contrast,
4

DIFS
a transmitter can not detect collisions when transmitting in
Source RTS DATA
wireless networks; rather, it relies on the receiver’s acknowl-
edgment to determine if any collision has taken place in the SIFS SIFS SIFS
transmission duration. Clearly, the resulting collision period Destination CTS ACK

is quite long and unaffordable if a long data transmission DIFS Contention


encounters collisions. In this regard, how to effectively reduce Other NAV (RTS) Window
NAV (CTS)
collisions becomes a key issue for MAC design in MANETs.
Backoff After
Several mechanisms has been proposed to avoid collisions Defer Access Defer
in medium access, namely carrier sense, handshake, and
backoff mechanism. Carrier sense requires that a node
Fig. 2. RTS/CTS/DATA/ACK and NAV setting
transmit only when the channel is determined idle. Multiple
handshakes between the transmitter and receiver includes
some short frames to avoid long collision period of data
packets, and acknowledgements of successful transmissions. sense threshold (CST). Otherwise, the channel is determined
The Backoff mechanism forces each node to wait a random idle. It can be seen clearly that the value of CST decides
period before attempting transmission. In the following, we the sensing range and affects both the collision possibility
first introduce these mechanisms in the context of the IEEE and spatial reuse in MANETs. (Notice that the SINR must
802.11 DCF protocol. Then, we discuss some schemes that exceeds the capture threshold for correct decoding.) The
outperform the 802.11 DCF by improving these mechanisms. larger the sensing range, the smaller the possibility that
a new transmission attempt interferes with some ongoing
1) Carrier Sense, Handshake, and Backoff in the IEEE transmissions. On the other hand, a larger sensing range
802.11 DCF Protocol: The IEEE 802.11 DCF is a contention- implies that more nodes have to defer their transmissions
based MAC protocol. To reduce the collision possibility, it uses when one node is transmitting, which leads to poorer spatial
carrier sense functions and binary exponential backoff (BEB) reuse. In ns-2, a widely used network simulator that simulates
mechanism. In particular, two carrier sense functions, physical the realistic settings of WaveLAN card of Lucent company,
and virtual carrier-sense functions, are used to determine the the sensing range is about 550m, more than twice the
state of the medium. The former is provided by the physical transmission range, which is about 250m. Fig. 1 shows both
layer and the latter by the MAC layer, which is also referred ranges for node A, B, and C.
to as the network allocation vector (NAV). NAV predicts
the duration that the medium will be busy in the future 3) Backoff Mechanisms: Although BEB is widely used in
based on a duration information announced in transmitted many contention-based MAC protocols for its simplicity and
frames. When either function indicates a busy medium, the good performance, it suffers from both fairness and efficiency.
medium is considered busy; otherwise, it is considered idle. In BEB, each station resets its CW size to the minimum value
In the BEB mechanism, each node selects a random backoff after a successful transmission, and doubles its CW after a
timer uniformly distributed in [0, CW ], where CW is the failed transmission. Therefore, it might be quite likely that a
current contention window (CW) size. It decreases the backoff node that has gained the channel and transmitted successfully
timer by one for each idle time slot (may wait for DIFS will gain the channel in the following channel contention. The
after a successful transmission, or EIFS after detection of worst-case scenario is that one node monopolizes the channel
an erroneous frame). Transmission shall commence whenever while all other nodes are completely denied channel access.
the backoff timer reaches zero. When there are collisions On the other hand, BEB is also diagnosed with low efficiency
during the transmission or when the transmission fails, the when there are many active nodes [6], [8] and hence severe
node doubles the value of CW until it reaches the maximum contention for the channel. Analysis has shown that after
value CWmax . Then, the node starts the backoff process reaching its peak, the aggregate throughput decreases along
again, and retransmit the packet when the backoff is complete. with the input traffic; also, the aggregate throughput decreases
If the maximum transmission failure limit is reached, the with the number of active stations under saturated status. Thus
retransmission shall stop, CW shall be reset to the initial value there are a lot of papers discussing new backoff mechanisms,
CWmin , and the packet shall be discarded. such as [10]–[17]
The DCF protocol provides two access mechanisms. One A multiplicative increase and linear decrease (MILD) was
is two-way handshake, i.e., DATA/ ACK, and the other is proposed in the MACAW protocol [10] to address the large
four-way handshake, i.e., RTS/ CTS/ DATA/ ACK. When variation of the contention window size and the unfairness
the length of DATA packet is long, short frames Request- problem of BEB. In MILD, the backoff interval is increased
To-Send (RTS) and Clear-To-Send (CTS) should be used by a multiplicative factor (1.5) upon a collision and decreased
to avoid possible long collision period of DATA packets. by 1 step upon a successful transmission, where step is
The four-way handshake and NAV setting are shown in Fig. 2. defined as the transmission time of a RTS frame. MILD works
well when the traffic load is steadily heavy. However, the
2) Carrier Sensing Range: In the carrier sense mechanism, “linear decrease” sometimes is too conservative, and it suffers
a node determines the channel is busy when the received performance degradation when the traffic load is light or the
signal power exceeds a certain threshold, referred to as carrier number of active nodes changes sharply [11]. To overcome
5

these problems, the exponential increase exponential decrease have no packets for the polling station and the transmission
(EIED) backoff algorithm has been studied in [11], [12]. In time of polling packets, as a result, is wasted.
the EIED algorithm, the contention window size is decreased In an effort to achieve the advantages of both sender-
by a factor τD upon a successful transmission, and increased initiated and receiver-initiated channel access, some hybrid
by a factor τI upon a collision. As a result, EIED is not as channel access methods are explored. A hybrid channel access
conservative as the “linear decrease” of MILD and not as scheme was proposed in [20]. A node that implements this
progressive as the “reset” of BEB. scheme operates alternately in two modes, sender-initiated (SI)
Realizing that there is a different optimal contention win- or receiver-initiated (RI). The transmission pair will try to
dow size for different number of active nodes, many studies enter into RI mode when the sender sends the same RTS
focused on adaptive contention window schemes [13], [14]. By pacekt for more than one half of the times allowed in the
collecting observed collision statistics, these schemes estimate IEEE 802.11 MAC protocol and has received no response
the number of currently active nodes and hence calculate a from the intended receiver. By adaptively sharing the burden of
new contention window size to schedule the next transmission. initiating the collision-avoidance handshake between the nodes
Note that in these schemes, timely and accurate estimate of that experience different levels of contention, better fairness
the number of active stations, which, at the same time, is may be achieved with almost no degradation in throughput.
not easy [18], is a prerequisite to significant performance In another scheme, the multihop packet scheduling scheme
improvements. [21], when the receiver is overloaded, a negative CTS (NCTS)
A fast collision resolution (FCR) algorithm was proposed is used to notify the transmitter of congestion, and then the
in [16]. The FCR algorithm has the following characteristics: transmission pair enters into the receiver-initiated mode. When
1) uses much smaller initial (minimum) contention window congestion is mitigated and backlogged packets have been
size as compared to the IEEE 802.11 MAC; 2) uses much transmitted, the receiver initiates a three-way handshake and
larger maximum contention window size as compared to the then the transmission pair comes back to the sender-initiated
IEEE 802.11 MAC; 3) increases the contention window size mode. In this way, this scheme effectively keeps upstream
when a node is in both collision state and deferring state nodes from overloading downstream ones. As a result, end-
(after the node senses the start of a new busy period); 4) to-end throughput is greatly improved by reducing collisions
reduces the backoff timers exponentially fast when a prefixed and avoiding dropping packets at the first few hops; end-to-
number of consecutive idle slots has been detected; 5) assigns end delay is also greatly decreased by reducing long queueing
the maximum successive packet transmission limit to achieve delay at forwarding nodes.
good fairness performance. It is demonstrated in [16] that this It is important to note that in both sender- and receiver-
algorithm indeed resolves collisions faster and reduces the initiated handshakes, acknowledgements for successful
idle slots more effectively than the BEB of the IEEE 802.11 transmissions are necessary due to the unreliable wireless
MAC protocol. environment of MANETs. Even if the transmission of
DATA packets is collision-free, it may still be corrupted by
4) Sender-initiated and Receiver-initiated Channel Access: short-term channel fading. Therefore, MAC protocols should
Multiple handshakes between a transmitter and a receiver can provide a way to allow the transmitter to know whether
be largely divided into two categories, sender-initiated and the transmission is successful or not. In other words, the
receiver-initiated. Both the two-way DATA/ACK and four-way bidirectional information exchange for each DATA packet
RTS/CTS/DATA/ACK handshake of the IEEE 802.11 MAC transmission, such as a DATA/ACK handshake, is necessary
protocol are sender-initiated. The sender has full knowledge between a transmitter and a receiver.
of packets in its queue and it initiates the handshake only
when there are pending packets. The exchange of short RTS 5) Batch Transmission: Batch transmission is another way
and CTS frames in a four-way handshake between a trans- to improve the efficiency of MAC protocols. A node does
mitter and a receiver serves as a channel reservation that not need to contend for the channel again for one or more
notifies overhearing nodes to defer their access to the shared succeeding packets/fragments after a successful transmission.
channel so as to avoid collisions. In receiver-initiated channel This is somewhat equivalent to the case where longer DATA
access, a receiver polls its neighbor actively to see if they packets are used in the IEEE 802.11 protocol. Since the
have packets for itself. MACA-BI (multiple access collision collision probability may be the same before each transmission
avoidance by invitation) [19] adopts a three-way handshake, attempt, throughput is improved as the successful transmission
i.e., CTS/DATA/ACK, to conduct the channel access where period is prolonged.
the CTS frame severs as the polling packet. The receiver In fact, batch transmission has already been adopted by
needs to receive relatively long data packets and has better the IEEE 802.11 protocol in a fragmentation/defragmentaiton
knowledge of the contention around itself. In addition, the scheme. Given a fixed channel bit error rate, it is clear that
three-way handshake has less control overhead than the four- longer packets are more vulnerable to transmission errors.
way handshake of the IEEE 802.11 MAC protocol, which Therefore, fragmentation that creates smaller data units than
explains why MACA-BI outperforms the four-way handshake the original large DATA packets can increase transmission
of the IEEE 802.11 when traffic characteristics are stationary reliability by reducing the packet error probability. Note that
or predictable. However, it does not work well in the dynamic each fragment needs to be acknowledged by the receiver. Once
ad hoc network environments because the polled nodes may a node has gained the channel, it continues to send fragments
6

until all fragments have been sent, or an acknowledgement much simpler than that over the DATA channel. A node only
is not received, or the node is restrained from sending any needs to check the existence of the busy tone signal at certain
additional fragments due to a maximum transmission time frequency by the sensed power level. Thus it might be viable
limit. Should the sending of the fragments be interrupted due in MANETs and deserves more experimental studies.
to one of the above reasons, the node will resume transmission FAMA-NCS (Floor Acquisition Multiple Access with Non-
when the next opportunity for transmission comes. Batch persistent Carrier Sensing) [22] provides another solution to
transmission has also been used in several other schemes, such the hidden terminal problem. It uses long dominating CTS
as OAR (opportunistic auto rate) [53]. In OAR, each node packets to act as a receiver busy tone to prevent any competing
opportunistically sends multiple back-to-back data packets transmitters in the receiver’s range from transmitting. To
whenever the channel quality is good and hence achieves sig- guarantee no collision with an ongoing data transmission, this
nificant throughput improvements over time-varying channels. scheme requires each node that hears the interference to keep
Despite its throughput enhancement, batch transmission silence for a period of one maximum data packet. Clearly,
itself does not necessarily reduce the potential collision prob- this is not efficient, especially when the RTS/CTS negotiation
ability experienced by each transmission attempts when there process fails or DATA packets are relatively short.
are many concurrent users. So the efficiency is still affected Beside busy tone related schemes, there are many studies
by the collisions. In addition, it is harmful for urgent mes- that employ multiple channels to alleviate these two problems
sages and real-time data which have strict end-to-end delay for DATA packet transmissions, which will be discussed in
requirements because whichever node occupies the channel detail in the following subsection.
blocks transmissions by other nodes. To alleviate this side
effect, schemes like the IEEE 802.11, OAR or FCR, also define
C. Employing Multiple Channels to Improve Efficiency
a maximum period to limit the total duration of continuous
transmissions by one node. Notice that in schemes that only one channel, all kinds of
packets, such as RTS/ CTS/ DATA/ ACK in the IEEE 802.11
protocols, are transmitted in the same channel. There thus exist
B. Solutions to Hidden Terminal and Exposed Terminal Prob- collisions between any two kinds of these packets. To avoid
lems the collisions, the bidirectional exchanges of these packets
In multihop wireless networks, the hidden terminal problem significantly limit the spatial reuse due to the coupling of
is a main cause for collisions and the exposed terminal hidden and exposed terminal problems as discussed in Section
problem limits the spatial reuse as previously discussed in II-A.2.
Section II-A.2. Notice that multihop wireless networks span One common approach to reduce collisions between
a large area, each node may have multiple hidden terminals. different kinds of packets is to exploit the advantage of
Hence the hidden terminal problem is commonplace, which multiple channels, and transmit different kinds of packets
differs from a single wireless LAN, where each node can sense over different separate channels [25]–[34], [37], [41], [45].
all others’ transmissions and requires only one-hop wireless
transmissions. 1) Schemes with a Common Control Channel: Many
Out-of-band busy tone signal is widely used in many schemes use a separate channel for transmitting control pack-
schemes to overcome the hidden terminal problem, or the ets, such as RTS and CTS, and one or more channels for trans-
exposed terminal problem, or both [23]–[26], [41], [43]. In the mitting data and acknowledgements, i.e., DATA and ACK. In
scheme busy tone multiple access(BTMA) [23], a base station the DCA (Dynamic Channel Assignment) scheme [28], the
broadcasts a busy tone signal to keep the hidden terminals overall bandwidth is divided into one control channel and
from accessing the channel when it senses a transmission. n data channels. Each data channel is equivalent and has
The scheme relies on a centralized network infrastructure the same bandwidth. The purpose of the control channel is
which is not available in ad hoc networks. The dual busy to resolve the contention on data channels and assign data
tone multiple access (DBTMA) scheme [24], [26] employs channels to mobile hosts. Each mobile host is equipped with
a transmit busy tone at a transmitter to prevent the exposed two half-duplex transceivers. One is for control channel, and
terminals from becoming new receivers, and a receive busy another is dynamically switched to one of the data channels
tone at the receiver to prevent the hidden terminals from to transmit data packets and acknowledgements. A five-way
becoming new transmitters. The exposed terminals are able handshake is used. RTS and CTS are used for negotiation
to initiate data packet transmissions, and the hidden terminals of a data channel for data transmissions, and CTS and RES
can reply to RTS requests and initiate data packet reception. (reservation) packets notify the neighbors of the sender and
The busy tone technique provides a simple solution to the receiver of the reserved data channel, respectively. All RTS,
hidden terminal and exposed terminal problems, but it requires CTS and RES packets are transmitted over the control channel.
additional channels and transceivers. The busy tone channel DCA follows an “on-demand” style to assign channels to
must be close to the DATA channel and hence can have similar mobile hosts, and does not requires clock synchronization. The
channel gain to that of the DATA channel, and there must collisions between data packets are alleviated due to the use
also be enough spectral separation between these channels of multiple data channels. Two similar protocols which also
to avoid inter-channel interference. However, the bandwidth dynamically negotiate a data channel for data transmission
requirement of busy tone signal is small and the decoding is were proposed in [29], [30]. These two protocols only use one
7

half-duplex transceiver, but require more complex negotiations channel. A transmitter also transmits jamming signals on the
and bookkeeping. S channel while waiting or receiving a CTS/ACK frame on
The dual busy tone multiple access (DBTMA) scheme [26] the R channel. For a receiver, while it is waiting or receiving
splits the single common channel into two sub-channels: a data a DATA frame on S channel, it jams the R channel to
channel and a control channel. Data packets are transmitted on prevent neighboring nodes from transmitting RTS frames on
the data channel. Control packets (RTS/ CTS) are transmitted the S channel. Jamming signal is the one that, with sufficient
on the control channel. As discussed in Section III-B, two energy, can cause the medium to become busy. Since it will
busy tones are used: the transmit busy tone, which indicates stop if the RTS/CTS exchange fails, it resolves the erroneous
that a node is transmitting on the data channel, and the receive reservation problem in the IEEE 802.11 protocol. In addition,
busy tone, which indicates that a node is receiving on the it also effectively blocks hidden terminals from transmitting,
data channel. It gives a solution to both hidden and exposed which may interfere with ongoing transmissions.
terminal problems. However, in the DBTMA scheme, no
acknowledgment is sent to acknowledge a transmitted DATA 3) Schemes with Synchronization: The schemes
packet, which is clearly deficient for unreliable wireless links. discussed above are all contention-based, and do not
Furthermore, potential collisions between acknowledgments need synchronization information for medium access control.
and other packets could greatly degrade the performance. However, accurate synchronization may benefit MAC design
DUCHA (MAC with dual transmission channels) [31] in- as shown in ( [35]–[37]), although it is difficult for a large
troduces a NACK period in which the receiver busy tone is scale MANET( [38], [39]). In the HAMA (Hybrid Activation
lengthened if the received data packet is corrupted due to Multiple Access) scheme [35], a neighbor protocol was
channel fading. The sender which senses the NACK tone will proposed to update the two-hop neighborhood information
conclude that the data transmission has failed. The NACK over a common channel on the best-effort basis. Using this
period is also exploited to alleviate the MAC contentions neighborhood information, each node determines whether to
between the upstream nodes and the downstream nodes of transmit in the current time slot using a spreading code that
a multihop path by allowing the receiver to begin to contend is dynamically assigned. In this way, it provides collision-free
for the channel after a successful reception while keeping the data transmissions. In the scheme MMAC (Multi-channel
neighboring nodes silent during the NACK period. MAC) [36], each node is equipped with a single half-duplex
MAC-SCC (MAC with a Separate Control Channel) [32] transceiver and can use one of N channels that are of the same
still regards the two channels as one control channel and bandwidth. Time is divided into fixed intervals using beacons,
one data channel, and the data channel is assigned more and there is a small window at the start of each interval
bandwidth than the control channel. Note, however, control to indicate traffic and negotiate channels for use during
packets RTS and CTS can be transmitted not only over the interval. The scheme BROADEN (Binary-countdown/
control channel but also over data channel in order to reduce RTS/ OTS/ agree-to-send (ATS)/ disagree-to-send (DTS)/
transmission time, as long as the transmitter senses both ensure-to-send (ETS)/ neaten-to-send (NTS)) [37] partitions
channels are idle. MAC-SCC also uses two NAVs for the the wireless channel into one control channel and one data
data channel and the control channel, respectively. The two channel. Time synchronization is used to conduct a binary
NAVs make it possible for the control channel to schedule count-down mechanism so that there is only one successful
not only the current data transmission but also the next data competitor when multiple active nodes exist.
transmission, thereby reducing the backoff time.

2) Schemes without a Common Control Channel: Unlike


D. MAC Protocols with Transmission Power Control (TPC)
those schemes that use a common control channel, this kind
of schemes does not rely on it. Instead, they are flexible in
arranging different channels for RTS/ CTS/ DATA/ ACK to Carrier
reduce collisions. Both ICSMA (interleaved CSMA) [33] and sensing range
JMAC (Jamming-based MAC) [34] are such schemes, which
divide the entire bandwidth into two channels and employ one B A
half-duplex transceiver for each channel. ICSMA [33] uses two
F E CTS RTS D C
channels of equal bandwidth. A node is permitted to originate
transmission in either channel. The transmitter sends RTS and
DATA on one channel, and the receiver responds by sending
CTS and ACK on the other channel. This scheme supports
simultaneous transmissions between two nodes. That is to say,
when one node is sending RTS or DATA, or receiving CTS or Fig. 3. Inefficiency of classic CSMA/CA
ACK from the other node, the latter one is also sending the
same kind of packets at a different channel to the former one. While the CSMA/CA mechanism is simple, it can be
In JMAC [34], the medium is divided into two channels: overly conservative [41] [43] [44] [45] [47], leading to low
S channel and R channel. RTS and DATA are transmitted on spatial reuse, low energy efficiency as well as high co-channel
the S channel, and CTS and ACK are transmitted on the R interference. This is because that, in the CSMA/CA, all nodes
8

transmit control and data packets at a fixed (and maximal) between two intended communicators to determine relative
power level; and any node that senses signal with power channel gain. This information is then utilized to derive the
level higher than a certain threshold or hears the RTS or the minimum power level necessary for the transmission of data
CTS defers its transmission until the ongoing transmission is packets. The power level used for RTS and data transmission
complete. For illustration, consider the situation in Figure 3, should be less than the maximum allowable power level above
where node A uses its maximum transmission power (TP) which it may cause interference to the ongoing neighboring
to send packets to node B. If omnidirectional antennas are communication. The maximum allowable transmission power
used, the region reserved for the communication between node level (used to transmit RTS) is determined based on how
pair A and B is the union of the regions circled by the strong the receiving busy tones (BTr ) are around the intended
RTS transmission range, the CTS transmission range, and the sender. CTS and receiving busy tone (BTr ) are transmitted
physical carrier sensing range. According to CSMA/CA, since by receivers at the maximal power level. In addition, a sender
nodes D and E fall into the reserved region and thus have sends transmission busy tone (BTt ) during data transmission at
to refrain from transmission (either data or control packet) the the same power level as that of data. Any node that hears
to avoid interfering with the ongoing transmission between BTt should not agree to intended reception. In the PCMA
A and B. However, it is easy to show that the three data (Power Controlled Multiple Access) protocol [43], similar
transmissions A → B, D → C, and F → E can be to [41], PCMA generalizes the transmit-or-defer “on/off”
concurrent if the nodes are able to synchronize locally and collision avoidance model of CSMA/CA to a more flexible
select appropriate transmission powers. Furthermore, all the “variable bounded power” collision suppression model. The
necessary transmission power will be less than the maximum main distinction of [43] in comparison to [41] is the use of
transmission power defined in CSMA/CA, which means much interference margin, whereby a greater number of simultane-
energy can be saved. ous transmissions are allowed, thus increasing spatial reuse.
Due to the benefits of increasing spatial reuse and energy The interference margin is advertised by the receiver over a
conservation, power control MAC protocols have been exten- separate busy tone channel.
sively researched. The basic idea of distributed power control To avoid using busy tone to locally broadcast the interfer-
MAC proposed in the literatures is as follows. Nodes ex- ence margin, the PCDC (Power Controlled Dual Channel) pro-
change their RTS and CTS packets at the maximum allowable tocol [45] advertises it by RTS and CTS, which are transmitted
power(Pmax ) in order to reduce the collision probability of on a separate control channel. In addition, to further increase
data and ACK, but send their data and ACK packets at the the spatial reuse and provide better protection of ACK packets
minimum power (Pmin ) necessary for reliable communication. than the schemes by [41] [43], the authors in [45] propose the
In [42], RTS and CTS packets are sent at the highest (fixed) use of a second control channel for sending ACK messages.
power level (Pmax ), and the DATA and ACK is sent at a lower Although the simulations of the TPC schemes in [41]
power level. This basic power control scheme is designed to [43] [45] indicate impressive throughput performance, as [47]
improve energy efficiency. However, as shown in [44], it may pointed out, there are four major design issues with these
also degrade network throughput. The reason is that reducing schemes that make their practicality questionable:
power for data transmission also reduces carrier sensing range • In [41] [43] [45], the channel gain is assumed to be the
so that ACK (as well as DATA) are more likely to be collided. same for both the control (or busytone) and data channels. In
In [44], the authors enhanced this approach by periodically fact, it might not be true.
increasing the TP of the data packet to Pmax , allowing for • It is assumed that nodes are able to transmit on one
enough time to protect the reception of the ACK at the channel and, simultaneously, receive on the other. To do so,
source. While this class of power control schemes achieves a mobile node must be equipped with two transceivers. The
good reduction in energy consumption, it contributes little to complexity and cost of the additional hardware may not justify
improving the throughput in comparison with the 802.11 MAC the increase in throughput.
protocol. The main reason is that, as in the 802.11 approach, • Interoperability with existing standards and hardware is,
RTS and CTS messages are used to silence neighboring nodes, if not impossible, difficult. Currently, most wireless devices
preventing concurrent transmissions from taking place over the implement the IEEE 802.11b standard. The class of two-
reserved floor. channel protocols is not backward compatible with the IEEE
To increase spatial reuse, [41] and [43] introduce the 802.11 standard, which makes it difficult to deploy such
interf erence − limited media access control schemes. Con- schemes in real networks.
current data transmissions are allowed as long as the multiple • Finally, the optimal allocation of the total spectrum
access interference does not corrupt the ongoing neighboring between the data and control channels is load dependent. For
transmissions. This is completely different from the idea the allocation to be optimal under various traffic loads, it has to
of “carrier-sensing” based media access control schemes, in be adjusted adaptively. However, it is not feasible in practice.
which any node in the carrier sensing range of an ongoing The POWMAC (Power Controlled MAC) protocol proposed
transmission node pair should defer its intended transmission. in [47] addresses all the above issues and provides a com-
In [41], the authors proposed a new MAC protocol that com- prehensive, throughput-oriented MAC solution for MANETs
bines the mechanisms of power control, RTS/CTS dialogue, using a single-transceiver and a single channel. Instead of
and busy tones. The main idea is to use the exchange RTS alternating between the transmission of control (RTS/CTS) and
and CTS packets (based on the signal strength of RTS/CTS) data packets, as done in the 802.11 scheme, POWMAC uses
9

an access window (AW) to allow for a series of RTS/CTS (RTS) message, and then set the transmission rate for each
exchanges to take place before multiple, concurrent data packet according to the highest achievable value determined
packet transmissions can commence. The length of the AW is by the channel conditions. As Figure 4 shows, the sender Src
dynamically adjusted (based on local traffic load information) chooses a data rate based on some heuristic and then stores
to allow for concurrent interference-limited transmissions to the rate and the size of the data packet into the RTS. Node A,
take place in the same vicinity of a receiving node. Collision overhearing the RTS, calculates the duration of the requested
avoidance information is inserted into the CTS packet and is reservation DRT S using the rate and packet size carried in the
used to bound the transmission powers of potential interferers, RTS. A then updates its NAV to reflect the reservation. While
rather than to silence such nodes. Simulation results demon- receiving the RTS, the receiver Dst generates an estimate
strate the achievable, significant throughput and energy gains. of the conditions for the impending data packet transmission
Before we end this subsection, it is important to note that based on the SINR of RTS. Dst then selects the appropriate
the choice of interference margin in interference-limited media rate based on that estimate, and transmits it and the packet size
access power control schemes is a difficult issue. As both over- in the CTS back to the sender. Node B, overhearing the CTS,
provisioning and under-provisioning of interference margin calculates the duration of the reservation DCT S and updates
leads to performance loss, one may expect that it is better its NAV to reflect the reservation. Finally, Src responds to
to dynamically adjust the interference margin based on local the receipt of the CTS by transmitting the data packet at
traffic load and topology. the rate chosen by Dst. In the case that the rates chosen
by the sender and receiver are different, then the reservation
E. Rate Adaptive MAC Protocols DRT S calculated by A will no longer be valid. Thus, DRT S
only serves as a tentative reservation. Final reservations are
As wireless channel is time-varying and location dependent
confirmed by the presence or absence of a special subheader,
due to path loss, shadowing, small-scale fading as well as
called the Reservation SubHeader (RSH), in the MAC header
interference, rate adaptation is a powerful way to overcome
of the data packet. The fields in the reservation subheader
channel variations. As a matter of fact, unlike the original
consist of only those fields needed to update the NAV, and
IEEE 802.11 protocol that only supports a single base rate,
essentially amount to the same fields present in a RTS.
the IEEE 802.11a and 802.11b PHY/MAC standards have
As channel condition is evaluated just before data packet
incorporated physical-layer multi-rate capability. The feasible
transmission, the estimation of the channel condition is quite
data rate set of the IEEE 802.11a is 6, 9, 12, 18, ..., 54 Mbps
accurate, so that RBAR yields significant throughput gains as
whereas that of the IEEE 802.11b is 1, 2, 5.5, and 11 Mbps.
compared to ARF (as well as compared to the single-rate IEEE
By adapting modulation and error-coding schemes to channel
802.11).
conditions, both high throughput and energy efficiency are
Typically, channel coherence time exceeds multiple packet
expected to improve.
transmission time for both mobile and non-mobile users. It
The first commercial MAC that utilizes rate adaptation
is wise to let a user transmit more packets when in good
was the Auto Rate Fallback (ARF) protocol [51]. With ARF,
channel condition and transmit less packets when in bad
senders attempt to use higher transmission rates after con-
channel condition. In RBAR, only one packet is allowed to
secutive transmission successes, which indicate high channel
transmit each time, which is not efficient especially when
quality, and revert to lower rates after failures. Under most
channel is good. To better exploit durations of high-quality
channel conditions, ARF provides a performance gain over
channels conditions, [53] introduces the Opportunistic Auto
pure single rate IEEE 802.11. However, ARF cannot well
Rate (OAR) protocol to opportunistically send multiple back-
adapt to fast multipath fading.
to-back data packets whenever the channel quality is good. By
DRTS
exploiting good channel condition and reducing overhead for
competing channel, OAR achieves significant throughput gains
DRSH as compared to RBAR. Moreover, over longer time scales,
A OAR ensures that all nodes are granted channel access with the
RTS RSH DATA
same time-shares as achieved by the single-rate IEEE 802.11.
Src From the point view of throughput, proportional fairness [56]
CTS ACK is achieved by OAR.
Dst
In the above schemes, only time diversity is considered.
DCTS
These schemes mitigate channel variations rather than uti-
B lize channel variations. In wireless LANs or mobile ad hoc
T0 T1 T2 T3 T4 networks, it is usual that a node needs to communicate
Time with several neighbors. Since channel quality are normally
time-varying and independent across different neighbors, this
Fig. 4. Timeline of RBAR protocol provides the node with a opportunity to choose one of its
neighbors with good channel quality to transmit data before
In [52], a protocol termed Receiver Based Auto Rate those with bad channel quality, if the FIFO (First-In-First-
(RBAR) was proposed. In RBAR, receivers measure the chan- Out) service discipline is not strictly enforced. In other words,
nel quality using physical-layer analysis of the request-to-send multiuser diversity may be exploited. However, it is not simple
10

to utilize the multiuser diversity due to signalling problem. To since DATA and ACK are transmitted directionally, thus
exploit the multiuser diversity in a distributed fashion, [57] reducing interference region. One strong assumption in [59]
presents the Opportunistic packet Scheduling and Auto Rate is that each node knows exact locations of other nodes by
(OSAR) protocol. The basic idea of OSAR is to extend the means of additional hardware such as GPS, and each node
functionality of the collision avoidance process (RTS/CTS) transmits signals based on the direction derived from such
to probe channel conditions of several candidate receivers si- physical location information.
multaneously. In the beginning, the intended sender multicasts Considering the locating and tracking problem in mobile
RTS message to a selected group of candidate receivers. Each ad hoc networks, Nasipuri et al. [60] proposed another MAC
candidate receiver evaluates the instantaneous link quality protocol that does not require additional hardware to identify
based on the RTS. The candidate receiver with channel quality the directions to specific nodes. Both RTS and CTS frames are
better than a certain level is allowed to access the medium. transmitted omnidirectionally in this study. By comparing the
Considering more than one candidate receiver may have good received power from each (sectorized) antenna upon receiving
channels and are ready to receive data, a coordinating rule is RTS and CTS, the receiver and transmitter can determine the
applied to avoid collision. The RTS includes a list of the media direction of each other. Though both directional transmission
access priority of each candidate receiver. According to the and directional reception are considered in [60], any neighbor-
priority list, the qualified candidate receiver with the highest ing node hearing RTS and CTS should defer its transmission
priority is ensured to access the channel first. After that, rate (in any direction) until the data packet transmission completes.
adaptation and packet bursting technique are employed to This definitely does not fully utilize the benefit from direc-
utilize high quality channel. Since the signalling required for tional antennas.
utilizing multiuser diversity reuses the signalling for collision To exploit spatial reuse with both directional transmission
avoidance, which is an important component for CSMA/CA and directional reception, Takai et al. [62], proposed a new
MAC, overhead is very small. Ns-2 simulation results show carrier sense mechanism called Directional Virtual Carrier
that the proposed protocol can achieve significant performance Sensing (DVCS). RTS is firstly transmitted directionally ac-
gain without sacrificing fairness. cording to the cached AOA (Angle of Arrivals) information.
If directional RTS fails for four times, the transmitter will
transmit omni-directional RTS up to three times before no-
F. MAC Protocols Using Smart Antennas
tifying the higher layer of a link failure. The node updates
In recent years, one research direction that has been firmly the cahed AOA each time it receives a newer signal from
thrusted is the exploitation of smart antennas. Smart antennas, the same neighbor, and invalidates the cache if it fails to get
which include switched beam antennas, steered-beam an- CTS response back from the neighbor after four directional
tennas, adaptive array antennas, and multiple-input-multiple- transmissions of the RTS frame. The reception of RTS is
output antennas, are capable of directional transmission and omni-directional. Transmission and reception of CTS are di-
reception, interference suppression and achieving diversity rectional and omni-directional, respectively, and transmission
gain. Smart antenna technology offers a variety of potential and reception of DATA and ACK are both directional. The
benefits for wireless communication systems. In particular, it distinguishing feature of the DVCS protocol is as follows.
can improve spatial reuse, transmission range and hence net- Other than totally silencing all the neighbors that hear RTS
work capacity. Especially, the multiple input multiple output and CTS as [60], neighboring nodes only need to keep silence
(MIMO) technology, which relies on the use of adaptive digital in certain directions with the help of DVCS. In other words,
beamforming at both ends of the communication link, provides neighboring nodes are allowed to transmit as long as it does
extremely high spectral efficiencies [65] [66]. not interfere with the ongoing transmission. In this way, spatial
Since the design of contention based MAC protocol by reuse may be greatly increased. Another nice feature of the
using fully adaptive arrays and MIMO systems is still in DVCS protocol is that it can allow nodes with directional
its infancy because of complexity, the following discussion antennas to be interoperable with nodes with omnidirectional
mainly focuses on the challenges and solutions of MAC antennas. In addition, the DVCS protocol is relatively generic
protocol design with switched beam antennas and steered- in the sense that it does not depend on whether switched beam
beam antennas, which have been extensive studied. We believe antennas or steered-beam antennas are configured.
these schemes are also helpful in the design of MAC protocol To increase spatial reuse and transmission range, Choud-
with fully adaptive arrays and MIMO systems. hury et al. [63] proposed a basic DMAC (Directional MAC)
One of the first papers using directional antennas based on protocol and multihop RTS MAC protocol. The basic DMAC
802.11 MAC is [59] by Ko et al. The authors assume transmis- protocol is similar to the DVCS protocol [60]. The basic idea
sion could be omnidirectional or directional while reception of multihop RTS protocol is that a node uses multi-hop RTSs
is omnidirectional only. CTS frames are always transmitted to establish links between distant nodes, and then transmits
omnidirectionally, while RTS control frames are transmitted CTS and DATA over a single hop. Since an idle node operates
directionally or omnidirectionally. Using directional RTS has in the omnidirectional mode to receive signal, RTS (even
potential to increase spatial reuse while using omnidirectional transmitted in directional mode) may not reach the intended
RTS can reduce the collision of CTS and/or ACK. So there is receiver even though the receiver is in the transmission range
tradeoff between spatial reuse and collision. But in general, when both directional transmission and directional reception
using directional antennas could lead to high spatial reuse are applied. Note that it is assumed that an upper layer at a
11

A B F1 F2
node is aware of its neighbors, and is capable of suppplying F1
the transceiver profiles required to communicate to each of F6 F2
these neighbors. F C F6 F3

There are two major problems with the basic DMAC pro- F5 F3
F4
tocol and the DVCS protocol [63], both caused by directional E D F5 F4
(a) (b)
transmission and/or directional reception. One is the hidden
terminal problem and the other is the deafness problem. The Fig. 5. An original topology (a) and its flow contention graph (b).
deafness problem may result in unproductive control packet
transmissions and even false indication of link breakage when
RTS-retransmit limit has been reached. To alleviate these two
problems, Korakis et al. [64] proposed a new MAC protocol share, which correspondingly reduces the channel reuse. Third,
based on circular directional RTS (circular directional CTS is since there is no centralized control, no station is guaranteed
also mentioned but not investigated in detail). The directional to have accurate knowledge of the contention even in its
RTS is transmitted in one direction each time, and keeps own neighborhood due to the dynamic traffic and topology of
going in a circular way until it scans all the area around the MANETs. As a result, it is very difficult to design mechanisms
transmitter. The RTS contains the duration of the intended to achieve fairness.
four way handshake and beam pair information (which is Many papers, such as [71]–[74], began to use the flow
available if the transmitter knows the direction of receiver contention graph to study the flow fairness in MANETs. Fig.
before sending RTS) so that the neighbors are aware of the 5 shows an original topology and its flow contention graph.
intended handshake and can defer their transmissions in the There are six flows, each lying between a pair of neighboring
direction of transmitter or receiver if this harms the ongoing nodes. Clearly, at any time there are at most two flows
transmission. In this way, both hidden terminal problem and that can transmit simultaneously without colliding with each
deafness problem can be greatly alleviated. One disadvantage other, such as F1 and F4. Translating this restraint into flow
of circular Directional RTS is that it increases the time for contention graph, we can see that there is no link between the
RTS-CTS handshake significantly. In addition, this scheme still two corresponding vertexes. Fairness is achieved by scheduling
cannot well address the hidden problem due to asymmetry in the same channel resource to the flows which have the same
gain [63]. level of contentions in the contention graph, if possible.
It is also worth mentioning some other efforts along this The tradeoff between fairness and channel utilization can
line. In [61], Ramanathan presented a broad-based examination be defined as an optimization problem:
of the potential gain by using beamforming antennas. One of N
X
the interesting findings is that link power control is essential M AX wi fi (xi ), (2)
in exploiting the benefits of beamforming antennas to their i=1
fullest. In [67], Ramanathan et al. provided a method to where N is the number of flows, xi is the rate for flow i, fi (xi )
employ power control. MAC protocols with adaptive array is a strictly concave utility function, and wi (> 0) is to provide
antennas were studied in [69] and [68]. A graph theory based weighted fairness or service differentiation. Note the solution
approach to designing MAC protocol for various types of xi of this problem must correspond to a feasible scheduling to
smart antennas(including MIMO systems) can be found in [70] achieve it. The utility function f (x) can be defined in terms
by Sundaresan and Sivakumar. of flow rate x as:

log x, if α = 1
fα (x) = (3)
G. Fairness Enhanced MAC (1 − α)−1 x1−α , otherwise
Fairness can be largely divided into per-node fairness and It is shown that the flow rate allocation will approach the
per-flow fairness. As per-node fairness can be improved by system’s optimal fairness as α → 0, the proportional fairness
adopting fairer backoff mechanisms as discussed in Section as α → 1, and the max-min fairness as α → ∞.
III-A.3, in this subsection, we focus on per-flow fairness. Since the optimal solution of the above problem depends
In MANETs, there are several unique characteristics that on global topology, and is difficult to achieve in MANETs,
make it very difficult to achieve, or even consistently define, several sub-optimal and distributed solutions were proposed.
the notion of fairness. First, the contention for the wireless In [71], [72], the schemes require information to be exchanged
channel is location-dependent. Transmission of a packet in- between neighbors to construct a local flow contention graph,
volves contention over the joint neighborhoods of the sender and accordingly coordinate the channel access. The scheme in
and the receiver. And the level of contention for the wireless [71] schedules a delay in the backoff procedure of MAC layer
channel in a geographical region is dependent on the number according to the flow degree. In [72] the minimal contention
of contending nodes and traffic status in the region. Second, window size of backoff timer is dynamically adjusted based
there is a tradeoff between channel utilization and fairness. on the obtained share of bandwidth. In contrast, PFCR (Pro-
Spatial reuse of the channel bandwidth can be achieved by portional Fair Contention Resolution) [73] and FMAC (Fair
scheduling simultaneous transmissions whose regions are not MAC) [74] do not need any knowledge of the topology of
in conflict. However, achieving fairness requires allocating the the network. PFCR introduces a N O CON T EN D state and
channel to a flow with a large contention for a certain time begins contending for the channel with a probability of xi
12

when a flow has a packet to transmit and the channel is idle. not really transmitted when the VMAC decides it wins the
And it observes the experienced contention and accordingly channel. When the estimated delay by both VS and VMAC
adjusts xi . The basic idea of FMAC is trying to let each exceeds 10 ms, new real-time sessions are denied service. In
flow transmit exactly one packet in a time interval t whose contrast, no admission control is applied to data traffic. Note
length changes with the load of the network or the contention that in addition to call admission control, real-time traffic is
context. The number of transmissions in the time interval t assigned smaller backoff contention window than data traffic.
serves as the feedback signal to adjust the contention window In [78], a scheme referred to as call admission and rate
or the time interval. All these schemes achieve better fairness control (CARC) was proposed to provide statistical QoS guar-
than the IEEE 802.11 with more or less sacrifice of aggregate antee in wireless LANs. CARC conducts admission control
throughput in certain topologies. However, they are all limited over real-time traffic and rate control over best effort traffic.
to one-hop flows. This is because, although multihop flows The rate control algorithm determines the amount of best effort
are not unusual in MANETs, defining and achieving fairness traffic that the MAC layer can deliver in such a way that its
for multihop flows turns out to be a very complicated issue. contention with real-time traffic is kept at a small level and
One of the reasons is that fairness with respect to end-to-end full utilization of the channel is achieved at the same time.
flow rate is tightly coupled with higher layer protocols, such In [79], a stateless wireless ad hoc networks (SWAN) model
as routing and congestion control. was proposed for MANETs. SWAN uses local rate control
for best-effort traffic, and sender-based admission control for
real-time UDP traffic to deliver service differentiation.
H. Quality of Service in MANETs
While supporting real-time applications with appropriate
IV. C ONCLUSION AND F UTURE R ESEARCH
QoS in MANETs is desirable, it seems to be a formidable
task considering network topology and traffic load dynamically In this paper, we have surveyed recent advances in medium
change in MANETs, making connection state maintenance and access control in mobile ad hoc networks. We first pinpointed
bandwidth reservation extremely difficult. In response, current some challenges and design issues that an efficient MAC pro-
research mainly focuses on providing service differentiation tocol needs to take into account. Then, we selectively focused
rather than strict QoS by using distributed control at the MAC on several research areas that we think are important to MAC
layer. design, which include basic mechanisms for contention-based
Service differentiation at the MAC layer can be achieved MAC protocols, solutions to the hidden terminal and exposed
by assigning different channel access opportunities to dif- terminal problems, multichannel transmission, transmission
ferent types of traffic. Different backoff contention window power control, rate adaptation, use of smart antennas, fairness,
and DIFS are widely used as differentiation techniques for and QoS provisioning. As can be clearly seen, significant
such purposes. For example, in the Enhanced Distributed progress has been made in these areas, with numerous schemes
Coordination Function (EDCF) of IEEE 802.11e draft [75], and technologies having been developed. More importantly,
traffic is divided into eight categories or priority levels. Before we have gained deeper understanding of fundamental problems
transmitting, each node needs to wait for the channel to be and achievable solutions, which lays a foundation for future
idle for a period of time associated with its corresponding progress. At the same time, it is recognized that due to the
traffic category called Arbitration Interframe Space (AIFS). inherent complexity of mobile ad hoc networks, the continuous
Typically, a shorter AIFS and a smaller backoff contention emergence of new physical layer technologies, and the ever-
window are associated with a traffic category with higher increasing user demands for newer and better services, many
priority, by which EDCF establishes a probabilistic priority critical issues remain unresolved. Listed below are several of
mechanism to allocate bandwidth based on traffic categories. them that need to be further researched.
In [76], similar differentiation mechanisms are also adopted • Interference-limited Channel Access
to associate each packet with a different priority, which is Since carrier sensing, on which the 802.11 MAC protocol
determined based on packet arrival time and packet delay is based, has been demonstrated to be inefficient, the colli-
bound. In this way, delay-sensitive traffic is better supported. sion avoidance may shift from carrier sensing approach to
Besides prioritized channel access, admission control for the Interference-limited approach. In the latter approach, multiple
real-time traffic is another powerful tool to support better QoS. neighboring node pairs are allowed to communicate concur-
It can effectively keep the congestion of the channel at a low rently as long as the target SINR of each node pair is satisfied.
level and reduce long queueing delay. A distributed admission Accordingly, the hidden terminal and exposed terminal need
control algorithm [77] was proposed for a multicell topology to be redefined. In addition to increasing spatial reuse, this
where each cell has a base station. Both data and real-time approach can exploit the benefits of smart antennas, power
traffic are considered. This scheme relies on two algorithms, control, and new modulation and error coding schemes to
i.e., virtual source (VS) and virtual MAC (VMAC), to measure their fullest potential. Moreover, it is believed to be more
the channel state. In both VS and VMAC algorithms, a virtual general, fundamental, and independent of emerging physical
packet was put in the MAC layer or the queue. Virtual packets layer techniques.
are scheduled to transmit on the radio channel the same way as • Fairness for Multihop Flows
a real packet, which means channel testing and random backoff Although fairness in wired networks has been thoroughly
are performed when necessary. A virtual packet, however, is studied, it is quite different in MANETs due to the very
13

nature of wireless communication. Although fairness on one- [12] H. Wu, S. Cheng, Y. Peng, K. Long, and J. Ma. IEEE 802.11 Distributed
hop flows has been currently studied, that on multihop flows is Coordination Function (DCF): Analysis and Enhancement. Proc. IEEE
ICC’02, April 2002.
an open area despite the fact that multihop flows are common [13] G. Bianchi, L. Fratta, and M. Oliver. Performance evaluation and
in MANETs. Part of the reason for this is that consistently enhancement of the CSMA/CA MAC protocol for 802.11 wireless
defining and achieving fairness for multihop flows are very LANs. Proc. IEEE PIMRC’96, Oct. 1996.
[14] F. Cali, M. Conti, and E. Gregori. Dynamic tuning of the IEEE
challenging. Compared to short flows, longer flows traverse 802.11 protocol to achieve a theoretical throughput limit. IEEE/ACM
more mobile nodes and consume more channel resource to fin- Transactions on Networking, vol. 8, no. 6, December 2000.
ish the end-to-end packet transmission, because for each flow, [15] Y. Kwon, Y. Fang, and H. Latchman. A Novel MAC Protocol with
Fast Collision Resolution for Wirelss LANs. Proc. IEEE INFOCOM’03,
the one-hop transmission at each node needs to contend for March 2003.
the channel with all its two-hop neighbors. Also, longer flows [16] Y. Kwon, Y. Fang, and H. Latchman. Design of MAC protocols with
are more likely to encounter route failures and subsequently Fast Collision Resolution for Wireless Local Area Networks. IEEE
Transactions on Wireless Communications, vol 3, pp. 793-807, 2004.
re-routing, since network topology is dynamically changing [17] Z.Y. Fang and B. Bensaou. A Novel Topology-Blind Fair Medium
due to mobility. Consider a very simple scenario where only a Access Control for Wireless LAN and Ad Hoc Networks. Proc. IEEE
one-hop flow or a multihop flow in a MANET. The end-to-end ICC’03, May 2003.
[18] G. Bianchi and I. Tinnirello. Kalman Filter Estimation of the Number
throughput of the multihop flow is much less than that of the of Competing Terminals in An IEEE 802.11 Network. Proc. IEEE
one-hop flow for the reasons mentioned in the above. INFOCOM’03, March 2003.
• Cross-layer Design [19] F. Talucci, M. Gerla, and L. Fratta. MACA-BI(MACA by invitation)-
A Receiver Oriented Access Protocol for Wireless Multihop Networks.
Many research findings call for the cross layer design Proc. IEEE PIMRC’97, Sept. 1997.
for wireless networks. TCP performance [80] in terms of [20] Y. Wang and J. J. Garcia-Luna-Aceves. A New Hybrid Channel Access
Scheme for Ad Hoc Networks. ACM WINET Journal, Special Issue on
throughput and fairness over ad hoc networks is very sensitive Ad-Hoc Networks, Vol. 10, No. 4, July 2004.
to packet loss which may be due to collision, wireless channel [21] H. Zhai, J. Wang, and Y. Fang. Distributed Packet Scheduling for
error, link breakage as well as congestion. Improvement of Multihop Flows in Ad Hoc Networks. Proc. IEEE WCNC’04, March,
2004
link reliability, reducing hidden/exposed terminal problem [22] C. L. Fullmer and J.J. Garcia-Luna-Aceves. Solutions to Hidden Termi-
and deafness problem, and hop-by-hop link-layer congestion nal Problems in Wireless Networks. Proc. ACM SIGCOMM’97, Sept.
control [81] are all helpful in improving end-to-end TCP 1997.
[23] F.A. Tobagi and L. Kleinrock. Packet switching in radio channels: Part
performance. When power control and direction antennas are II–The hidden terminal problem in carrier sense multiple-access and
considered, the control of transmission range and direction of the busy-tone solution. IEEE Trans. Commun., vol. COM-23, pp. 1417-
the routing control packets largely affects final routing deci- 1433, Dec. 1975.
[24] Z.J. Haas and J. Deng. Dual Busy Tone Multiple Access (DBTMA) - A
sion. Another interesting case is the exploitation of channel Multiple Access Control for Ad Hoc Networks. IEEE Transactions on
variations by joint work on opportunistic routing and MAC Communications, vol. 50, no. 6, pp. 975-985, June 2002.
layer anycasting [82]–[85]. Overall, we believe that cross layer [25] S. Singh and C.S. Raghavendra. PAMAS-Power Aware Multi-Access
Protocol with Signalling for Ad Hoc Networks. ACM SIGCOMM
design seems a must to provide end-to-end QoS at both packet Computer Communication Review, vol. 28, pp. 5-26, 1998.
and flow level. [26] J. Deng and Z.J. Haas. Dual Busy Tone Multiple Access (DBTMA): A
New Medium Access Control for Packet Radio Networks. Proc. IEEE
ICUPC’98, Oct. 1998.
R EFERENCES [27] F. Tobagi, L. Kleinrock. Packet Switching in Radio Channels: Part III
C Polling and (Dynamic) Split-Channel Reservation Multiple Access.
IEEE Trans. Commun, Vol. COM-24, no. 8, pp. 832-844, August 1976.
[1] IEEE standard for Wireless LAN Medium Access Control (MAC) and
[28] S.-L. Wu, C.-Y. Lin, Y.-C. Tseng, and J.-P. Sheu. A New Multi-Channel
Physical Layer (PHY) specifications, ISO/IEC 8802-11: 1999(E), Aug.
MAC Protocol with On-Demand Channel Assignment for Mobile Ad
1999.
Hoc Networks. Int’l Symp. on Parallel Architectures, Algorithms and
[2] P. Gupta and P.R. Kumar. The Capacity of Wireless Networks. IEEE Networks (I-SPAN), pp. 232-237, 2000.
Transactions on Information Theory, vol. IT-46, pp. 388-404, 2000. [29] N. Choi, Y. Seok, and Y. Choi. Multi-channel MAC protocol for mobile
[3] M. Grossglauser and D. Tse. Mobility Increases the Capacity of Adhoc ad hoc networks. Proc. IEEE VTC 2003-Fall, Oct. 2003.
Wireless Networks. IEEE/ACM Transactions on Networking, vol. 10, [30] K. Liu, T. Wong, J. Li, L. Bu, and J. Han. A reservation-based multiple
pp. 477-486. Aug. 2002. access protocol with collision avoidance for wireless multihop ad hoc
[4] D. Shah, A. El Gamal, J. Mammen, and B. Prabhakar. Throughput Delay networks. Proc. IEEE ICC’03, May 2003.
Trade-off in Wireless Networks. Proc. IEEE Infocom’04, March 2004. [31] H. Zhai, J. Wang, Y. Fang, and D. Wu. A Dual-Channel MAC Protocol
[5] W.C. Jakes. Microwave Mobile Communications. Wiley, 1974. for Mobile Ad Hoc Networks. IEEE Workshop on Wireless Ad Hoc and
[6] G. Bianchi. Performance Analysis of the IEEE 802.11 Distributed Sensor Networks, in conjuction with IEEE Globecom 2004, Nov. 2004.
Coordination Function. IEEE JSAC, vol. 18, no. 3, March 2000. [32] Y. Li, H. Wu, D. Perkins, N. Tzeng, and M. Bayoumi. MAC-SCC:
[7] H. Zhai, Y. Kwon, and Y. Fang. Performance Analysis of IEEE 802.11 Medium Access Control with a Separate Control Channel for Multihop
MAC Protocols in Wireless LANs. Accepted for publication in Wiley Wireless Networks. Proc. 23rd International Conference on Distributed
Wireless Communications and Mobile Computing, July 2004. Computing Systems Workshops (ICDCSW’03), May 2003.
[8] H. Zhai, and Y. Fang. Performance of Wireless LANs Based on IEEE [33] S. Jagadeesan, B.S. Manoj, and C.S.R. Murthy. Interleaved Carrier Sense
802.11 MAC Protocols. Proc. IEEE PIMRC’03, Sept. 2003. Multiple Access: An Efficient MAC Protocol for Ad Hoc Wireless
[9] P. Karn. MACA-A new channel access method for packet radio. Proc. Networks. Proc. IEEE ICC’03, May 2003.
ARRL/CRRL Amateur Radio 9th Computer Networking Conf, pp134- [34] S.-R. Ye, Y.-C. Wang, and Y.-C. Tseng. A jamming-based MAC protocol
140, 1990. for wireless multihop ad hoc networks. Proc. VTC 2003-Fall, Oct. 2003
[10] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang. MACAW: A [35] L. Bao and J.J. Garcia-Luna-Aceves. Hybrid Channel Access Scheduling
media access protocol for wireless LAN’s. Proc. ACM SIGCOMM’94, in Ad Hoc Networks. Proc. IEEE ICNP’02, Nov. 2002.
1994, pp. 212-225. [36] J. So and N. H. Vaidya. A Multi-Channel MAC Protocol for Ad Hoc
[11] N. Song, B. Kwak, J. Song, and L.E. Miller. Enhancement of IEEE Wireless Networks. Proc. ACM Mobihoc’04, May, 2004.
802.11 Distributed Coordination Function with Exponential Increase [37] T. You, C. Yeh, and H. Hassanein. A New Class of Collision Prevention
Exponential Decrease Backoff Algorithm. Proc. IEEE VTC 2003-Spring. MAC Protocols for Wireless Ad Hoc Networks. Proc. IEEE ICC’03,
April, 2003 May 2003.
14

[38] S. Ganeriwal, R. Kumar, M.B. Srivastava. Timing-sync Protocol for [65] S. D. Blostein and H. Leib. Multiple Antenna Systems: Their Role and
Sensor Networks. Proc. ACM Sensys’03, Nov. 2003 Impact in Future Wireless Access. IEEE Comm. Mag., July 2003.
[39] K. Romer. Time Synchronization in Ad Hoc Networks. Proc. ACM [66] D. Gesbert, M. Shafi, D. Shiu, P. J. Smith, and A. Naguib. From
MobiHoc’01, Oct. 2001 Theory to Practice: An Overview of MIMO Space-Time Coded Wireless
[40] M. B. Pursley, H. B. Russell, and J. S. Wysocarski. Energy-efficient Systems. IEEE JSAC, vol. 21, no.3, pp. 281-301, April 2003.
transmission and routing protocols for wireless multiple-hop networks [67] R. Ramanathan, J. Redi, C. Santivanez, D. Wiggins, and S. Polit. Ad Hoc
and spread spectrum radios. Proc. the EUROCOMM Conference, 2000. Networking with Directional Antennas: A Complete System Solution.
[41] S. Wu, Y. Tseng and J. Sheu. Intelligent medium access for mobile ad Proc. IEEE WCNC’04, March, 2004
hoc networks with busy tones and power control. IEEE JSAC, Vol. 18, [68] N.S. Fahmy and T.D. Todd. A Selective CSMA Protocol with Cooper-
pp. 1647 -1657, Sept. 2000. ative Nulling for Ad Hoc Networks with Smart Antennas. Proc. IEEE
[42] J. Gomez, A. T. Campbell, M. Naghshineh, and C. Bisdikian. Con- WCNC’04, March, 2004
serving Transmission Power in Wireless Ad Hoc Networks. Proc. IEEE [69] H. Singh and S. Singh. Tone based MAC protocol for use with Adaptive
ICNP’01, Nov. 2001. Array Antennas. Proc. IEEE WCNC’04, March, 2004
[43] J. Monks, V. Bharghavan, and W. Hwu. A Power Controlled Multiple [70] K. Sundaresan and R. Sivakumar. A Unified MAC Layer Framework for
Access Protocol for Wireless Packet Networks. Proc. IEEE INFO- Ad hoc Networks with Smart Antennas. Proc. ACM Mobihoc’04, May
COM’01, April 2001. 2004.
[44] E. Jung and N. Vaidya. A Power Control MAC Protocol for Ad Hoc [71] H. Luo, S. Lu, and V. Bharghavan. A New Model for Packet Scheduling
Networks. Proc. ACM MobiCom’02, September 2002. in Multihop Wireless Networks. Proc. ACM Mobicom’00, Aug. 2000.
[45] A. Muqattash and M. Krunz. Power Controlled Dual Channel (PCDC) [72] X.L. Huang and B. Bensaou. On Max-min Fairness and Scheduling in
Medium Access Protocol for Wireless Ad Hoc Networks. Proc. IEEE Wireless Ad-Hoc Networks: Analytical Framework and Implementation.
INFOCOM’03, March 2003. ACM Mobihoc’01, Oct. 2001.
[46] V. Kawadia and P. R. Kumar. Power Control and Clustering in Ad Hoc [73] T. Nandagopal, T.-E. Kim, X. Gao, and V. Bharghavan. Achieving MAC
Networks. Proc. IEEE INFOCOM’03, March 2003. Layer Fairness in Wireless Packet Networks. Proc. ACM Mobicom’00,
[47] A. Muqattash and M. Krunz. A single-channel solution for transmission Aug. 2000.
power control in wireless ad hoc networks. Proc. ACM MobiHoc’04, [74] Z. Fang and B.Bensaou. Fair Bandwidth Sharing Algorithms based on
May 2004. Game Theory Frameworks for Wireless Ad-hoc Networks. Proc. IEEE
[48] V. Kawadia and P. R. Kumar. Principles and Protocols for Power Control Infocom’04, March 2004.
in Ad Hoc Networks. Accepted for publication in IEEE JSAC: Special [75] Draft Supplement to Part 11: Wireless Medium Access Control
Issue on Ad Hoc Networks, Vol I. (MAC) and Physical Layer (PHY) specifications: Medium Access Con-
[49] R. Ramanathan and R. Rosales-Hain. Topology control of multihop trol (MAC) Enhancements for Quality of Service (QoS), IEEE Std
wireless networks using transmit power adjustment. Proc. IEEE INFO- 802.11e/D8.0, Feb. 2004.
COM’00, March 2000. [76] V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and E. Knightly. Dis-
tributed Multi-Hop Scheduling and Medium Access with Delay and
[50] R. Wattenhofer, L. Li, P. Bahl, and Y.-M. Wang. Distributed topology
Throughput Constraints. Proc. ACM MOBICOM’01, July 2001.
control for power e.cient operation in multihop wireless ad hoc networks.
[77] A. Veres, A.T. Campbell, M. Barry, and L.H. Sun. Supporting Service
Proc. IEEE INFOCOM’01, April 2001.
Differentiation in Wireless Packet Networks Using Distributed Control.
[51] A. Kamerman and L. Monteban. WaveLAN II: A high-performance
IEEE JSAC, Vol. 19, No. 10, pp. 2094-2104, 2001.
wireless LAN for the unlicensed band. Bell Labs Technical Jour-
[78] H. Zhai, X. Chen, and Y. Fang. A Call Admission and Rate Control
nal,1997.
Scheme for Multimedia Support over IEEE 802.11 Wireless LANs. Proc.
[52] G. Holland, N. H. Vaidya and P. Bahl. A Rate-Adaptive MAC Protocol
First International Conference on Quality of Service in Heterogeneous
for Multi-Hop Wireless Networks. Proc. MOBICOM’01,2001.
Wired/Wireless Networks (QShine’04), Oct. 2004.
[53] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly. Opportunistic [79] G.S. Ahn, A.T. Campbell, A. Veres, and L.H. Sun. Supporting Ser-
Media Access for Multirate Ad Hoc Networks. Proc. ACM MOBI- vice Differentiation for Real-Time and Best Effort Traffic in Stateless
COM’02,2002. Wireless Ad Hoc Networks (SWAN). IEEE Transactions on Mobile
[54] D. Qiao, S. Choi, and K.G. Shin. Goodput Analysis and Link Adaptation Computing, Vol. 1, No. 3, pp. 192-207, 2002.
for IEEE 802.11a Wireless LANs. IEEE Trans. on Mobile Computing [80] X. Chen, H. Zhai, J. Wang, and Y. Fang. TCP Performance over Mobile
(TMC), vol. 1, no. 4, October-December 2002. Ad Hoc Networks. Canadian Journal of Electrical and Computer
[55] B.-S. Kim, Y. Fang, T. F. Wong, and Y. Kwon. Dynamic fragmentation Engineering (CJECE), Vol. 29, No. 1/2, p129-134, January/April 2004.
scheme for rate-adaptive wireless LANs. Proc. IEEE PIMRC’03, Sept. [81] H. Zhai, X. Chen, and Y. Fang. Alleviating Intra-flow and Inter-flow
2003. Contentions for Reliable Service in Mobile Ad Hoc Networks. Proc.
[56] P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushayana, and A. IEEE Milcom’04, Nov. 2004.
Viterbi. CDMA/HDR: a bandwidth efficient high speed wireless data [82] J. Wang, H. Zhai, W. Liu, and Y. Fang. Reliable and Efficient Packet
service for nomadic users. IEEE Comm. Magazine,Vol. 38, No. 7, pp. Forwarding by Utilizing Path Diversity in Wireless Ad Hoc Networks.
70-77, July 2000. Proc. IEEE Milcom’04, Nov. 2004.
[57] J. Wang, H. Zhai, Y. Fang, M. C. Yuang. Opportunistic Media Access [83] S. Biswas and R. Morris. Opportunistic Routing in Multi-Hop Wireless
Control and Rate Adaptation for Wireless Ad hoc Networks. Proc. IEEE Networks. Proc. the 2nd Workshop on Hot Topics in Networks (HotNets
ICC’04, June, 2004. II), MIT, Nov, 2003.
[58] T. S. Yum and K. W. Hung. Design Algorithms for Multihop Packet [84] R.R Choudhury and N. Vaidya. MAC-Layer Anycasting in Wireless Ad
Radio Networks with Multiple Directional Antennas. IEEE Transactions Hoc Networks. Proc. the 2nd Workshop on Hot Topics in Networks
on Communications, 40(11), 1992. (HotNets II), MIT, Nov, 2003.
[59] Y.B. Ko and N.H. Vaidya. Medium Access Control Protocols Using [85] S. Jain, Y. Lv, and S.R. Das. Exploiting Path Diversity in the Link
Directional Antennas in Ad Hoc Networks. Proc. IEEE INFOCOM’00, Layer in Wireless Ad Hoc Networks. Technical Report, WINGS Lab,
March 2000. July 2003
[60] A. Nasipuri, S. Ye, J. You and R. E. Hiromoto. A MAC Protocol
for Mobile Ad Hoc Networks Using Directional Antennas. Proc. IEEE
WCNC’00, September 2000.
[61] R. Ramanathan. On the Performance of Ad Hoc Networks with Beam-
forming Antennas. Proc. ACM MobiHoc’01, Oct. 2001.
[62] M. Takai, J. Martin, A. Ren, R. Bagrodia. Directional Virtual Carrier
Sensing for Directional Antennas in Mobile Ad Hoc Networks. Proc.
ACM MOBIHOC’02, June 2002.
[63] R.R. Choudhury, X. Yang, R. Ramanathan, N. Vaidya. Using Directional
Antennas for Medium Access Control in Ad Hoc Networks. Proc. ACM
MOBICOM’02, Sept. 2002.
[64] T. Korakis, G. Jakllari and L. Tassiulas. A mac protocol for full
exploitation of directional antennas in ad-hoc wireless networks. Proc.
ACM Mobihoc’03, June 2003.
15

Hongqiang Zhai received the B.E. and M.E. degrees Yuguang Fang received a Ph.D degree in Systems
in electrical engineering from Tsinghua University, and Control Engineering from Case Western Reserve
Beijing, China, in July 1999 and January 2002 University, Cleveland, Ohio, in January 1994, and a
respectively. He worked as a research intern in Bell Ph.D degree in Electrical Engineering from Boston
Labs Research China from June 2002 to December University, Massachusetts, in May 1997.
2002, and in Microsoft Research Asia from January From September 1989 to December 1993, he
2003 to July 2003. Currently he is pursuing the was a teaching/research assistant in Department of
PHD degree in the Department of Electrical and Systems, Control and Industrial Engineering at Case
Computer Engineering, University of Florida. His Western Reserve University, where he held a re-
research interest is in the area of communication search associate position from January 1994 to May
networks with a special emphasis on medium access 1994. He held a post-doctoral position in Department
control, congestion control and quality of service over wireless networks. He of Electrical and Computer Engineering at Boston University from June 1994
is a student member of the IEEE. to August 1995. From September 1995 to May 1997, he was a research
assistant in Department of Electrical and Computer Engineering at Boston
University. From June 1997 to July 1998, he was a Visiting Assistant Professor
in Department of Electrical Engineering at the University of Texas at Dallas.
From July 1998 to May 2000, he was an Assistant Professor in the Department
Jianfeng Wang received the B.E. and M.E. degrees of Electrical and Computer Engineering at New Jersey Institute of Technology,
in electrical engineering from Huazhong University Newark, New Jersey. In May 2000, he joined the Department of Electrical and
of Science and Technology, Wuhan, China, in 1999 Computer Engineering at University of Florida, Gainesville, Florida, where he
and 2002 respectively. Now he is working toward got the early promotion with tenure in August 2003 and has been an Associate
the PHD degree in the Department of Electrical and Professor since then. His research interests span many areas including wireless
Computer Engineering, University of Florida. His networks, mobile computing, mobile communications, automatic control, and
current research interests include wireless medium neural networks. He has published over one hundred (100) papers in refereed
access control and wireless multimedia. He is a professional journals and conferences. He received the National Science
student member of the IEEE. Foundation Faculty Early Career Award in 2001 and the Office of Naval
Research Young Investigator Award in 2002.
Dr. Fang has actively engaged in many professional activities. He is a
senior member of the IEEE and a member of the ACM. He is an Editor
for IEEE Transactions on Communications, an Editor for IEEE Transactions
on Wireless Communications, an Editor for IEEE Transactions on Mobile
Computing, a technical editor for IEEE Wireless Communications Magazine,
Xiang Chen received the B.E. and M.E. degrees an Editor for ACM Wireless Networks, and an Area Editor for ACM
in Electronic Engineering from Shanghai Jiao Tong Mobile Computing and Communications Review. He was an Editor for IEEE
University, Shanghai, China, in 1997 and 2000, re- Journal on Selected Areas in Communications: Wireless Communications
spectively. Afterwards, he worked as a MTS (mem- Series from May 1999 to December 2001, an Editor for Wiley International
ber of technical staff) in Bell Laboratories, Beijing, Journal on Wireless Communications and Mobile Computing from April
China. He is currently working toward the Ph.D. 2000 to January 2004 and the Feature Editor for Scanning the Literature in
degree in the department of Electrical and Com- IEEE Personal Communications (now the IEEE Wireless Communications)
puter Engineering at the University of Florida. His from April 2000 to April 2003. He has also actively involved with many
research interest includes resource allocation, call professional conferences. He is the Program Co-Chair for the Global Internet
admission control, and QoS in wireless networks, and Next Generation Networks Symposium in IEEE Globecom’2004, was the
including cellular networks, wireless LAN, and mo- Program Vice Chair for 2000 IEEE Wireless Communications and Networking
bile ad hoc networks. He is a member of Tau Beta Pi and a student member Conference (WCNC’2000) where he received the IEEE Appreciation Award
of IEEE. for the service to this conference. He has been serving on many Technical
Program Committees such as IEEE INFOCOM (2005, 2004, 2003, 2000,
and 1998), IEEE ICC (2004), IEEE Globecom (2004, 2003 and 2002),
IEEE WCNC (2004, 2002, 2000 and 1999), and ACM MobiCom (2001). He
served as the Committee Co-Chair for Student Travel Award for 2002 ACM
MobiCom. He was the Vice-Chair for the IEEE Gainesville Section in 2002
and 2003, and is the Chair in 2004. His email address is fang@ece.ufl.edu.

You might also like