{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:57:15Z","timestamp":1754157435431,"version":"3.41.2"},"reference-count":9,"publisher":"Emerald","issue":"9\/10","license":[{"start":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T00:00:00Z","timestamp":1224201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to focus on alleviating the problems of both hidden and exposed terminal, which remain unsolved in many directional MAC protocols.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>GPS is used to calibrate synchronization among the nodes, and directional antennas are used. In the protocol, different antenna mode and transmit power are used. The assertion signal and omni\u2010directional RTS are transmitted in omni\u2010directional mode, while directional CTS, directional RTS, DATA and ACK are transmitted in directional mode. With properly designed RTS\u2010CTS handshake, the protocol can make full use of spatial reuse of directional communication and enhance parallelism in data transmission.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The preliminary simulation results indicate that the protocol works well and achieves considerably high performance in both sparse and dense <jats:italic>ad hoc<\/jats:italic> networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The line of sight environment is the main limitation that the MAC protocol will be applied.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The protocol is a very useful solution for employing directional antennas for <jats:italic>ad hoc<\/jats:italic> networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The MAC protocol can effectively alleviate the directional hidden and exposed terminal problems as well as node deafness. It can greatly improve throughput and achieve low\u2010medium access delay, making it suitable for <jats:italic>ad hoc<\/jats:italic> networks.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684920810907571","type":"journal-article","created":{"date-parts":[[2008,10,25]],"date-time":"2008-10-25T07:12:37Z","timestamp":1224918757000},"page":"1287-1296","source":"Crossref","is-referenced-by-count":0,"title":["Design, modeling and simulation of a novel directional MAC protocol for <i>ad hoc<\/i> networks"],"prefix":"10.1108","volume":"37","author":[{"given":"Fan","family":"Jun","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhitang","sequence":"additional","affiliation":[]},{"given":"Nie","family":"Wei","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010620353614200_b4","unstructured":"Choudhury, R.R. and Vaidya, N.H. (2004), \u201cDeafness: a MAC problem in ad hoc networks when using directional antennas\u201d, Proceedings of the IEEE International Conference on Network Protocols (ICNP), Technical report."},{"key":"key2021010620353614200_b3","doi-asserted-by":"crossref","unstructured":"Choudhury, R., Yang, X., Ramanathan, R. and Vaidya, N. (2002), \u201cUsing directional antennas for medium access control in ad hoc networks\u201d, Proceedings of ACM Mobicom, September.","DOI":"10.1145\/570645.570653"},{"key":"key2021010620353614200_b1","unstructured":"Ko, Y.B., Shankarkumar, V. and Vaidya, N.H. (2000), \u201cMedium access control protocols using directional antennas in ad hoc networks\u201d, Proceedings of IEEE Conference on Computer Communications (INFOCOM), Tel Aviv, Israel, Vol. 1, p. 13."},{"key":"key2021010620353614200_b7","unstructured":"Li, Z. and Fang, H. (2005), \u201cModeling and controller design for networked control systems\u201d, Advances in Systems Science and Applications, Vol. 5 No. 1, pp. 36\u201040."},{"key":"key2021010620353614200_b2","unstructured":"Nasipuri, A., Ye, S., You, J. and Hiromoto, R.E. (2000), \u201cA MAC protocol for mobile ad hoc networks using directional antennas\u201d, Proc. of the IEEE Wireless Comm. and Networking Conf. (WCNC) 2000, Chicago, IL, USA."},{"key":"key2021010620353614200_b6","unstructured":"Stine, J. and de Veciana, G. (2004), \u201cA paradigm for quality of service in wireless ad hoc networks using synchronous signaling and node states\u201d, IEEE Journal Selected Areas of Communications, September, pp. 1301\u201021."},{"key":"key2021010620353614200_frd1","unstructured":"Luo, B., Wang, H. and Guo, Y. (2005), \u201cVoD service scheme based on ad hoc networks\u201d, Advances in Systems Science and Applications, Vol. 5 No. 3, pp. 389\u201094."},{"key":"key2021010620353614200_frd2","unstructured":"Ren, X. and Wang, H. (2005), \u201cA periodic route update\u2010based active source routing protocol for ad hoc networks\u201d, Advances in Systems Science and Applications, Vol. 5 No. 3, pp. 395\u2010403."},{"key":"key2021010620353614200_frd3","unstructured":"Stine, J., de Veciana, G., Grace, K. and Durst, R. (2002), \u201cOrchestrating spatial reuse in wireless ad hoc networks using synchronous collision resolution\u201d, Journal of Interconnection Networks, Vol. 3 Nos 3\/4, pp. 167\u201095."}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684920810907571","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920810907571\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920810907571\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:53:22Z","timestamp":1753401202000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/37\/9-10\/1287-1296\/459633"}},"subtitle":[],"editor":[{"given":"Mian\u2010yun","family":"Chen","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2008,10,17]]},"references-count":9,"journal-issue":{"issue":"9\/10","published-print":{"date-parts":[[2008,10,17]]}},"alternative-id":["10.1108\/03684920810907571"],"URL":"https:\/\/doi.org\/10.1108\/03684920810907571","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2008,10,17]]}}}