A reliable and efficient MAC layer broadcast (multicast) protocol for mobile ad hoc networks

Chun Yuah Chiu, Eric Hsiao Kuang Wu, Gen Huey Chen

Research output: Contribution to conferencePaperpeer-review

10 Scopus citations

Abstract

Broadcast/multicast is a key service for mobile ad hoc networks. A great number of applications rely on a reliable and efficient MAC layer broadcast The IEEE 802.11 broadcast protocol, which is based on Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), does not offer any MAC layer recovery on broadcast frames. Consequently, the increasing probability of lost frames may deteriorate the quality of broadcast/multicast services offered at upper layers. Previous protocols extended Request-To-Send (RTS), Clear-To-Send (CTS) and Acknowledgement (ACK) to enhance the broadcast reliability. However, they brought about the hidden terminal problem and the excessive retransmission problem at the same time. In this paper, we first formulate the broadcast problem as an optimization problem and show that it is NP-hard even if the upper layer service is periodical beacons. An approximation algorithm with a guaranteed approximation ratio is also suggested. Then a reliable and efficient MAC layer broadcast protocol, named Broadcast Protocol with Busy Tone (BPBT), is proposed. BPBT applies a busy tone to solve the hidden terminal problem. Finally, BPBT is compared with previous protocols for performance evaluation by simulation.

Original languageEnglish
Pages2802-2807
Number of pages6
StatePublished - 2004
EventGLOBECOM'04 - IEEE Global Telecommunications Conference - Dallas, TX, United States
Duration: 29 Nov 20043 Dec 2004

Conference

ConferenceGLOBECOM'04 - IEEE Global Telecommunications Conference
Country/TerritoryUnited States
CityDallas, TX
Period29/11/043/12/04

Keywords

  • Ad hoc network
  • Approximation algorithm
  • Broadcast
  • Busy tone
  • MAC

Fingerprint

Dive into the research topics of 'A reliable and efficient MAC layer broadcast (multicast) protocol for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this