SlideShare a Scribd company logo
1 of 9
Download to read offline
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                       Vol. 2, Issue4, July-august 2012, pp.1392-1400
       Efficient Throughput MAC Protocol in Ad-hoc Network’s
                                             Rahul Mukherjee,
                   HOD and Assistant Professor, Electronics & Communication Department,
        St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi Technical University, India

Abstract –
  This research aims at improving the throughput            II. HIDDEN AND EXPOSED NODE PROBLEMS
in distributed cooperative wireless ad-hoc                           The transmission range of stations in
networks by use of stations equipped with a new             wireless network is limited by the transmission power;
MAC. The main focus of this research is to show             therefore, all the station in a LAN cannot listen to each
that several existing schemes can degrade network           other. This means that normal carrier sense
throughput and can result in higher energy                  mechanism which assumes that all stations can listen
consumption than when using IEEE 802.11                     to each other, fails. In particular, this gives rise to
without power control. This work proposes a new             hidden node and exposed node problem. Consider
power controlled MAC protocol based on IEEE                 stations A, B, C and D as shown in figure.
802.11.It saves considerable amount of power and
achieves the performance matching with that of
IEEE 802.11.
Keywords – MANET, MAC (Media Access
Control), DCF (Distributed Coordination
Function), CSMA (Carrier Sense Multiple Access)

I. INTRODUCTION
          Cooperative ad-hoc networks are formed by
several homogeneous wireless stations. All the
stations cooperate with each other, i.e., the traffic for
the stations that are more than one hop away is routed
by the intermediate stations. The intermediate stations     Figure .2. Hidden & Exposed node problem
are called relaying stations.
          In the 802.11 protocol, the fundamental
mechanism to access the medium is called Distributed        III. CSMA/CA
Coordination Function (DCF). This is a random                        The most important part of a MAC protocol
access scheme, based on the Carrier Sense Multiple          is Channel Access Mechanism. The channel access
Access with Collision Avoidance (CSMA/CA)                   mechanism is way of regulating the use of physical
protocol. Retransmission of collided packets is             channel among the stations present in the network. It
managed according to binary exponential back off            specifies when a station can send or receive data on
rules. In this research work we limit our investigation     the channel.
to the DCF scheme. DCF describes two techniques to
employ for packet transmission. The default scheme is                 CSMA/CA (Carrier Sense Multiple Access)
a two-way handshaking technique called Basic                is derived from CSMA/CD (Collision Detection)
Access Mechanism.                                           which is the channel access mechanism used in wired
Figure .1. Wireless Ad-hoc Network                          Ethernets. Since the transmission range of wireless
                                                            stations is limited, collision cannot be detected
                                                            directly. This protocols tries to avoid the collision. On
                                                            arrival of a data packet from LLC, a station senses the
                                                            channel before transmission and if found idle, starts
                                                            transmission. If another transmission is going on, the
                                                            station waits for the length of current transmission,
                                                            and starts contention. Since the contention is a
                                                            random time, each station get statistically equal
                                                            chance to win the contention.




                                                                                                    1392 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                              Vol. 2, Issue4, July-august 2012, pp.
                                                   IV. IEEE 802.11 OPERATION

                                                                    The IEEE 802.11 MAC offers two kinds of
                                                          medium access methods, namely Distributed
                                                          Coordination       Function    (DCF),     and    Point
                                                          Coordination Function (PCF). DCF is the basic access
                                                          method in 802.11 and requires no infrastructure.
                                                             The IEEE 802.11 MAC offers two kinds of
                                                          medium access methods, namely Distributed
                                                          Coordination       Function    (DCF),     and    Point
                                                          Coordination Function (PCF). DCF is the basic access
                                                          method in 802.11 and requires no infrastructure.
                                                          When wireless stations are within transmit range of
                                                          each other, they form a Basic Service Set (BSS), and
                                                          can communicate to each other using DCF. If the BSS
                                                          contains only two stations, it is called Independent
Figure .3. CSMA Channel Access Mechanism                  Basic Service Set (IBSS). Many BSSs may be
                                                          connected by a Distribution System (DS) to form an
         CSMA/CA is asynchronous mechanism for            Extended Service Set (ESS). An access point (AP) is
medium access and does not provide any bandwidth          the station that provides access to DS services.
guarantee. It’s a best effort service and is suited for
packetized applications like TCP/IP. It adapts quite
well to the variable traffic conditions and is quite
robust against interference.




                                                          Figure .5. MAC Architecture

                                                                  The IEEE 802.11 MAC is designed for
                                                          wireless LANs. The requirements of multi-hop ad-hoc
                                                          networks are more challenging than those of wireless
                                                          LANs. In this research, we investigate the operation
                                                          of IEEE 802.11 MAC in centralized multi-hop ad-hoc
                                                          networks. The terms station and node are used
                                                          interchangeably throughout the thesis. Multi-hop
                                                          cooperative wireless ad-hoc networks will be simply
                                                          referred to as multi-hop networks.




                                                          Figure .6. Multi-hop Scenario

Figure .4. Flow chart of CSMA/CA                            Consider a multi-hop centralized scenario, as
                                                          shown in the figure. For convenience, the stations
                                                                                                1393 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                       Vol. 2, Issue4, July-august 2012, pp.1392-1400
inside the network are classified into following            contention can be decreased by using polling MAC
categories:                                                 where central station acts as polling station.

    Central station : is the central controlling station.
Most of the traffic in the network is directed towards
it.

  Inner stations : are within one hop boundary of the
central station.

   Boundary stations : are at one hop boundary of
the central station. These stations act as relaying
stations for the stations outside the reach of central
node. Outer stations are outside the communication
range of central node.                                      Figure .8. Hybrid PCF-DCF operation

                                                            IEEE 802.11 SCHEME SPECIFICATION

                                                               IEEE 802.11 specifies two medium access control
                                                            protocols, PCF (Point Coordination Function) and
                                                            DCF (Distributed Coordination Function). PCF is a
                                                            centralized scheme, whereas DCF is a fully
                                                            distributed scheme. We consider DCF in this paper.

                                                             Transmission range : When a node is within
                                                               transmission range of a sender node, it can receive
                                                               and correctly decode packets from the sender
                                                               node. In our simulations, the transmission range is
                                                               250 m when using the highest transmit power
                                                               level.

                                                             Carrier sensing range : Nodes in the carrier
                                                              sensing range can sense the sender’s transmission.
                                                              Carrier sensing range is typically larger than the
                                                              transmission range, for instance, two times larger
                                                              than the transmission range. In our simulations, the
Figure .7. IEEE 802.11 Architecture                           carrier sensing range is 550 m when using the
                                                              highest power level. Note that the carrier sensing
                                                              range and transmission range depend on the
V. IEEE 802.11 OPERATION IN MULTI-HOP                         transmit power level.
NETWORKS
                                                             Carrier sensing zone : When a node is within the
         The 802.11 MAC with DCF mode of                       carrier sensing zone, it can sense the signal but
operation is the simplest choice in multi-hop ad hoc           cannot decode it correctly. Note that, as per our
networks. The reason for the choice of DCF is that it          definition here, the carrier sensing zone does not
does not require any prior infrastructure. Two or more         include transmission range. Nodes in the
stations can come together and form an BSS. This               transmission range can indeed sense the
nature of DCF is very suitable for ad-hoc networks as          transmission, but they can also decode it correctly.
the ad-hoc networks are simply formed by as set of             Therefore, these nodes will not be in the carrier
stations coming together. In this section we discuss           sensing zone as per our definition. The carrier
the operation of 802.11 MAC in multi-hop networks,             sensing zone is between 250 m and 550 m with the
especially centralized multi-hop ad-hoc networks.              highest power level in our simulation.
Since the DCF is a contention based distributed
protocol, it performs badly in high load conditions.
The poor performance of DCF is due to fact that the
collisions increase as more and more stations try to
access the medium at the same time. It is well known
that the polling MAC performs better than pure
CSMA/CA under high load conditions. Therefore,

                                                                                                   1394 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                              Vol. 2, Issue4, July-august 2012, pp.




                                                          Figure .10. System Architecture of an Ad-hoc
                                                          network

  Figure .9. Carrier Sensing                                        In contrast to the ad hoc network,
                                                          infrastructure networks are established to provide
VI. MAC SUB LAYER IN IEEE 802.11                          wireless users with specific services and range
          The IEEE standard 802.11 specifies the most     extension. Infrastructure networks in the context of
famous family of WLANs in which many products are         IEEE 802.11 are established using APs. The AP is
already available. Standard belongs to the group of       analogous to the base station in a cellular
802.x LAN standards, e.g., 802.3 Ethernet or 802.5        communications network. The AP supports range
Token Ring. This means that the standard specifies        extension by providing the integration points
the physical and medium access layer adapted to the       necessary for network connectivity between multiple
special requirements of wireless LANs, but offers the     BSSs, thus forming an extended service set (ESS).
same interface as the others to higher layers to          The ESS has the appearance of one large BSS to the
maintain interoperability.                                logical link control (LLC) sub layer of each station
                                                          (STA). The ESS consists of multiple BSSs that are
 SYSTEM ARCHITECTURE                                     integrated together using a common distribution
          The basic service set (BSS) is the              system (DS). The DS can be thought of as a backbone
fundamental building block of the IEEE 802.11             network that is responsible for MAC-level transport
architecture. A BSS is defined as a group of stations     of MAC service data units (MSDUs).
that are under the direct control of a single
coordination function (i.e., a DCF or PCF) which is
defined below. The geographical area covered by the
BSS is known as the basic service area (BSA), which
is analogous to a cell in a cellular communications
network.
          Conceptually, all stations in a BSS can
communicate directly with all other stations in a BSS.
However, transmission medium degradations due to
multipath fading, or interference from nearby BSSs
reusing the same physical-layer characteristics (e.g.,
frequency and spreading code, or hopping pattern),
can cause some stations to appear hidden from other
stations. An ad hoc network is a deliberate grouping
                                                          Figure .11. Example of infrastructure network
of stations into a single BSS for the purposes of
internetworked communications without the aid of an
infrastructure network. Given figure is an illustration   VII. DCF OPERATION
of an independent BSS (IBSS), which is the formal                   The DCF is the fundamental access method
name of an ad hoc network in the IEEE 802.11              used to support asynchronous data transfer on a best
standard. Any station can establish a direct              effort basis. The DCF is based on CSMA/CA. The
communications session with any other station in the      carrier sense is performed at both the air interface,
BSS, without the requirement of channeling all traffic    referred to as physical carrier sensing, and at the MAC
through a centralized access point (AP).                  sub layer, referred to as virtual carrier sensing.
                                                          Physical carrier sensing detects presence of other
                                                                                                    1395 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                       Vol. 2, Issue4, July-august 2012, pp.1392-1400
users by analyzing the activity in the channel through
the received signal strength.                               Where, ACK size is the length (in bytes) of an ACK
         A station performs virtual carrier sense by       frame, and Bit Rate is the physical layer’s lowest
examining the received MPDU (MAC Protocol Data             mandatory rate. Preamble Length is 144 bits and PLCP
Unit) information in the header of RTS, CTS and            Header Length is 48 bits . Using a 1 Mbps channel bit
ACK frames. The stations in BSS use this information       rate,     EIFS       is       equal      to       364
to adjust their Network Allocation Vector (NAV),           μs
which indicates amount of time that must elapse until
the current transmission is complete and the channel
can be sampled again for idle status.




                                                             Figure .13. NAV duration in transmission range
                                                             and carrier sensing zone
  Figure .12. DCF access using RTS/CTS
                                                             VIII. BASIC POWER CONTROL PROTOCOL
A. Inter frame Spacing                                                 Different transmit powers used at different
   IFS is the time interval between frames. IEEE             nodes may also result in increased collisions, unless
802.11 defines four IFSs – SIFS (short inter frame           some precautions are taken. Suppose nodes A and B
space), PIFS (PCF inter frame space), DIFS (DCF              use lower power than nodes C and D. When A is
inter frame space), and EIFS (extended inter frame           transmitting a packet to B, this transmission may not
space). The IFSs provide priority levels for accessing       be sensed by C and D. So, when C and D transmit to
the channel. The SIFS is the shortest of the inter frame     each other using a higher power, their transmissions
spaces and is used after RTS, CTS, and DATA frames           will collide with the on-going transmission from A to
to give the highest priority to CTS, DATA and ACK,           B.
respectively. In DCF, when the channel is idle, a node
waits for the DIFS duration before transmitting any
packet.
          In figure, nodes in transmission range
correctly set their NAVs when receiving RTS or CTS.
However, since nodes in the carrier sensing zone
cannot decode the packet, they do not know the
duration of the packet transmission. To prevent a
collision with the ACK reception at the source node,
when nodes detect a transmission and cannot decode
it, they set their NAVs for the EIFS duration. The
main purpose of the EIFS is to provide enough time
for a source node to receive the ACK frame, so the
duration of EIFS is longer than that of an ACK              Figure .14. Differences in transmit power can lead
transmission. As per IEEE 802.11, the EIFS is                to increased collisions
obtained using the SIFS, the DIFS, and the length of
time to transmit an ACK frame at the physical layer’s                One simple solution (as a modification to
lowest mandatory rate, as the following equation :           IEEE 802.11) is to transmit RTS and CTS at the
                                                             highest possible power level but transmit DATA and
  EIFS = SIFS+ DIFS+ [ (8·ACKsize) + Preamble                ACK at the minimum power level necessary to
Length+ PLCP Header Length] / Bit Rate                       communicate.


                                                                                                   1396 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                              Vol. 2, Issue4, July-august 2012, pp.
         Figure shows nodes A and B send RTS and           using a power level equal to p desired. Similarly, the
CTS, respectively, with the highest power level so that    transmit power for the ACK transmission is
node C receives the CTS and defers its transmission.       determined when the destination receives the RTS.
By using a lower power for DATA and ACK packets,
nodes can conserve energy.




Figure .15. Basic Scheme.

         In the Basic scheme, the RTS–CTS
                                                           Figure .16. Basic Power Control Protocol.
handshake is used to decide the transmission power
for subsequent DATA and ACK packets. This can be
done in two different ways as described below. Let         IX. DEFICIENCY OF THE BASIC PROTOCOL
pmax denote the maximum possible transmit power
level.                                                              In the Basic scheme, RTS and CTS are sent
                                                           using pmax, and DATA and ACK packets are sent
    Suppose that node A wants to send a packet to         using the minimum necessary power to reach the
                                                           destination. When the neighbour nodes receive an
     node B. Node A transmits the RTS at power
     level pmax. When B receives the RTS from A            RTS or CTS, they set their NAVs for the duration of
     with signal level pr, B can calculate the             the DATA–ACK transmission. When D and E
     minimum necessary transmission power level,           transmit the RTS and CTS, respectively, B and C
     pdesired, for the DATA packet based on                receive the RTS, and F and G receive the CTS, so
     received power level pr, the transmitted power        these nodes will defer their transmissions for the
     level, pmax, and noise level at the receiver B.       duration of the D–E transmission. Node A is in the
                                                           carrier sensing zone of D (when D transmits at pmax)
         We can borrow the procedure for estimating        so it will only sense the signals and cannot decode the
pdesired from. This procedure determines pdesired          packets correctly. Node A will set its NAV for EIFS
taking into account the current noise level at node B.     duration when it senses the RTS transmission from D.
Node B then specifies pdesired in its CTS to node A.       Similarly, node H will set its NAV for EIFS duration
After receiving CTS, node A sends DATA using               following CTS transmission from E.
power level pdesired. Since the signal-to-noise ratio at              When transmit power control is not used, the
the receiver B is taken into                               carrier sensing zone is the same for RTS–CTS and
consideration, this method can be accurate in              DATA–ACK since all packets are sent using the
estimating the appropriate transmit power level for        same power level. However, in Basic, when a source
DATA.                                                      and destination pair decides to reduce the transmit
                                                           power for DATA–ACK, the transmission range for
                                                           DATA–ACK is smaller than that of RTS–CTS;
    In the second alternative, when a destination         similarly, the carrier sensing zone for DATA–ACK is
      node receives an RTS, it responds by sending a       also smaller than that of RTS–CTS.
      CTS as usual (at power level p max). When the
      source node receives the CTS, it calculates p
      desired based on received power level, pr, and
      transmitted power level (p max), as

P desired = p max/pr · Rxthresh · c,

where Rxthresh is the minimum necessary received
signal strength and c is a constant. We set c equal to 1
in our simulations. Then, the source transmits DATA
                                                                                                  1397 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                     (IJERA)        ISSN: 2248-9622       www.ijera.com
                       Vol. 2, Issue4, July-august 2012, pp.1392-1400




                                                            Figure .18. PCM periodically increases

                                                             The key difference between PCM and the Basic
Figure .17. Basic Scheme.                                 scheme is that PCM periodically increases the
                                                          transmit power to pmax during the DATA packet
                                                          transmission. With this change, nodes that can
X. PROPOSED         POWER        CONTROL        MAC
                                                          potentially interfere with the reception of ACK at the
PROTOCOL
                                                          sender will periodically sense the channel as busy, and
         Proposed power control MAC (PCM) is              defer their own transmission.
similar to the Basic scheme in that it uses power level
pmax for RTS–CTS and the minimum necessary                         Since nodes that can sense a transmission but
transmit power for DATA–ACK transmissions. We             not decode it correctly only defer for EIFS duration,
now describe the procedure used in PCM.                   the transmit power for DATA is increased once every
                                                          EIFS duration. Also, the interval which the DATA is
  1. Source and destination nodes transmit the RTS        transmitted at pmax should be larger than the time
and CTS using pmax. Nodes in the carrier sensing          required for physical carrier sensing.
zone set their NAVs for EIFS duration when they
sense the signal and cannot decode it correctly.                     Accordingly, 15 μs should be adequate for
                                                          carrier sensing, and time required to increase output
  2. The source node may transmit DATA using a            power (power on) from 10% to 90% of maximum
lower power level, similar to the BASIC scheme.           power (or power-down from 90% to 10% of
                                                          maximum power) should be less than 2 μs. Thus, we
   3. To avoid a potential collision with the ACK (as     believe 20 μs should be enough to power up (2 μs),
discussed earlier), the source node transmits DATA at     sense the signal (15 μs), and power down (2 μs). In
the power level pmax, periodically, for just enough       our simulation, EIFS duration is set to 212 μs using a
time so that nodes in the carrier sensing zone can        2 Mbps
sense it.                                                    bit rate. In PCM, a node transmits DATA at pmax
                                                          every 190 μs for a 20 μs duration. Thus, the interval
   4. The destination node transmits an ACK using         between the transmissions at pmax is 210 μs, which is
the minimum required power to reach the source            shorter than EIFS duration. A source node starts
node, similar to the BASIC scheme.                        transmitting DATA at pmax for 20 μs and reduces the
         Figure shows how the transmit power level        transmit power to a power level adequate for the given
changes      during     the    sequence      of     an    transmission for 190 μs. Then, it repeats this process
RTS–CTS–DATA–ACK transmission. After the                  during DATA transmission. The node also transmits
RTS–CTS handshake using pmax, suppose the source          DATA at pmax for the last 20 μs of the transmission.
and destination nodes decide to use power level p1 for
DATA and ACK. Then, the source will transmit                         With the above simple modification, PCM
DATA using p1 and periodically use pmax. The              overcomes the problem of the BASIC scheme and can
destination uses p1 for ACK transmission.                 achieve throughput comparable to 802.11, but uses
                                                          less energy. However, note that PCM, just like
                                                          802.11, does not prevent collisions completely.
                                                          Specifically, collisions with DATA being received by


                                                                                                 1398 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                          (IJERA)        ISSN: 2248-9622       www.ijera.com
                                   Vol. 2, Issue4, July-august 2012, pp.
the destination can occur, as discussed earlier. Our    XI. SIMULATION RESULTS
goal in this paper is to match the performance of
802.11 while reducing energy consumption. To be                      The given table shows all the different
more conservative in estimating the energy                 parameters taken into account for conducting the
consumption of PCM, we also perform our                    simulation in NS-2 atmosphere. In this table the
simulations where we increase the transmit power           values of all the different parameters are shown, using
every 170 μs for 40 μs during DATA transmission.           which the simulation for aggregate throughput and
                                                           total data delivered per joule in accordance with Data
   The proposed power control protocol is modified         rate per flow and Packet size is calculated for all three
such that in this the Data and ACK is transmitted at       schemes namely, BASIC, 802.11 and Proposed
lower power level but after a certain duration it is       protocol’s.
transmitted at higher power level for a very fraction of
time, in order to make the neighbouring nodes
understand that transmission is going on and they          Parameters                      Values
should restrict their transmission during that period so
                                                           Number of nodes                 50
that collision does not take place hence saving power
consumption.                                               Simulation Area(m)              800x800
                                                           Topology                        Random
                                                           Transmission range              50,100,150,200,250
                                                           Radio Propagation model         Shadowing
                                                           Traffic model                   CBR, TCP
                                                           Packet Size                     256,512,1024 bytes
                                                           Simulation times                150 seconds,300 seconds
                                                           Bandwidth                       2 Mbps
                                                           Routing                         DSR


                                                           A. Simulation Result for Aggregate Throughput vs
                                                           Data Rate Per Flow




Figure .19. Flow chart of Proposed Protocol


                                                                                                    1399 | P a g e
Rahul Mukherjee / International Journal of Engineering Research and Applications
                    (IJERA)        ISSN: 2248-9622       www.ijera.com
                      Vol. 2, Issue4, July-august 2012, pp.1392-1400
                                                  XII. CONCLUSION
B. Simulation Result for Aggregate Throughput vs                 In the past, MAC protocols that use the
Packet Size                                            maximum transmit power for RTS–CTS and the
                                                       minimum necessary transmit power for DATA–ACK
                                                       have been proposed with the goal of achieving energy
                                                       saving. It refer to this as the Basic scheme. However,
                                                       it is shown that the Basic scheme increases collisions
                                                       and retransmissions, which can result in more energy
                                                       consumption and throughput degradation.

                                                       XIII. REFERENCES
                                                       [1]   E. Pagnani and G. P. Rossi, “Providing reliable
                                                             and fault tolerant broadcast delivery in mobile
                                                             ad-hoc networks,” Mobile Networks and
                                                             Applications, 5(4), pp. 175-192, 1999.

                                                       [2]   J. Gomez, A.T. Campbell, M. Naghshineh and
                                                             C. Bisdikian, Conserving transmission power in
C. Simulation Result for Data Delivered per Joule            wireless ad hoc networks (November 2001).
vs Data rate per flow
                                                       [3]   R. Wattenhofer, L. Li, P. Bahl and Y.-M. Wang,
                                                             Distributed topology control for power efficient
                                                             operation in multihop wireless ad hoc
                                                             networks,Vol. 3 pp. 1388–1397 (April 2001).

                                                       [4]    N. Poojary, S.V. Krishnamurthy and S. Dao,
                                                             Medium access control in a network of ad hoc
                                                             mobile nodes with heterogeneous power
                                                             capabilities, in: Proc. IEEE International
                                                             Conference on Communications (ICC 2001),
                                                             Vol. 3 pp. 872–877 (2001).

                                                       [5]    B. Chen, K. Jamieson, H. Balakrishnan and R.
                                                             Morris, Span: An energy-efficient coordination
                                                             algorithm for topology maintenance in ad hoc
                                                             wireless networks (July 2001).




D. Simulation Result for Data Delivered per joule vs
Packet Size




                                                            Rahul Mukherjee :        H.O.D. & Asst Prof.
                                                       (EC-Deptt),
                                                       St. Aloysius Institute of Technology (SAIT),
                                                       Jabalpur, India. Pursuing P.hd in the field of Mobile
                                                       Adhoc Networks. Published research papers in three
                                                       international journals. Pursued M.Tech in
                                                       Communication Systems Engineering from KIIT
                                                       University, Bhubaneswar. His field of interests
                                                       comprises of Mobile Technology & Networking.




                                                                                             1400 | P a g e

More Related Content

What's hot

Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84Alexander Decker
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksSwapnil Raut
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...IJECEIAES
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113Alexander Decker
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
 

What's hot (20)

Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresLocal Restoration in Metro Ethernet Networks for Multiple Link Failures
Local Restoration in Metro Ethernet Networks for Multiple Link Failures
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 
7 satishkumar final_paper--75-84
7 satishkumar final_paper--75-847 satishkumar final_paper--75-84
7 satishkumar final_paper--75-84
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
 
eaodv
eaodveaodv
eaodv
 
05173187
0517318705173187
05173187
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...Performance evaluation of decode and forward cooperative diversity systems ov...
Performance evaluation of decode and forward cooperative diversity systems ov...
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
 
Tmac
TmacTmac
Tmac
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3
 

Viewers also liked (19)

My2421322135
My2421322135My2421322135
My2421322135
 
Gz2412431253
Gz2412431253Gz2412431253
Gz2412431253
 
Jc2516111615
Jc2516111615Jc2516111615
Jc2516111615
 
Ia2514401444
Ia2514401444Ia2514401444
Ia2514401444
 
Hh2513151319
Hh2513151319Hh2513151319
Hh2513151319
 
Id2414301437
Id2414301437Id2414301437
Id2414301437
 
Iy2515891593
Iy2515891593Iy2515891593
Iy2515891593
 
Hj2413101315
Hj2413101315Hj2413101315
Hj2413101315
 
Gr2411971203
Gr2411971203Gr2411971203
Gr2411971203
 
Ji2516561662
Ji2516561662Ji2516561662
Ji2516561662
 
Gu2412131219
Gu2412131219Gu2412131219
Gu2412131219
 
Iv2515741577
Iv2515741577Iv2515741577
Iv2515741577
 
Ht2413701376
Ht2413701376Ht2413701376
Ht2413701376
 
Hr2413591363
Hr2413591363Hr2413591363
Hr2413591363
 
Hd2412771281
Hd2412771281Hd2412771281
Hd2412771281
 
Hy2514281431
Hy2514281431Hy2514281431
Hy2514281431
 
La2418611866
La2418611866La2418611866
La2418611866
 
Ir2515501556
Ir2515501556Ir2515501556
Ir2515501556
 
Hn2413371341
Hn2413371341Hn2413371341
Hn2413371341
 

Similar to Hx2413921400

Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Shefa Idrees
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANKrishna Nanda
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and InternetworkingN.Jagadish Kumar
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...ijwmn
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networksambitlick
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanDeepak John
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportPanth Shah
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
 

Similar to Hx2413921400 (20)

Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11Tele Communications - IEEE 802.11
Tele Communications - IEEE 802.11
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
Wireless LANs
Wireless LANsWireless LANs
Wireless LANs
 
Ag34200206
Ag34200206Ag34200206
Ag34200206
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Computer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LANComputer Communication Networks-Wireless LAN
Computer Communication Networks-Wireless LAN
 
Media Access and Internetworking
Media Access and InternetworkingMedia Access and Internetworking
Media Access and Internetworking
 
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
Achieving Transmission Fairness in Distributed Medium Access Wireless Mesh Ne...
 
J010216776
J010216776J010216776
J010216776
 
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc NetworksTowards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
Towards the Performance Analysis of IEEE 802.11 in Multi-hop Ad-Hoc Networks
 
Module 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlanModule 3 wlan,bluetooth vlan
Module 3 wlan,bluetooth vlan
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Gu3311901196
Gu3311901196Gu3311901196
Gu3311901196
 
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...
 
A20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_ReportA20345606_Shah_Bonus_Report
A20345606_Shah_Bonus_Report
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 
P26093098
P26093098P26093098
P26093098
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Hx2413921400

  • 1. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1392-1400 Efficient Throughput MAC Protocol in Ad-hoc Network’s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi Technical University, India Abstract – This research aims at improving the throughput II. HIDDEN AND EXPOSED NODE PROBLEMS in distributed cooperative wireless ad-hoc The transmission range of stations in networks by use of stations equipped with a new wireless network is limited by the transmission power; MAC. The main focus of this research is to show therefore, all the station in a LAN cannot listen to each that several existing schemes can degrade network other. This means that normal carrier sense throughput and can result in higher energy mechanism which assumes that all stations can listen consumption than when using IEEE 802.11 to each other, fails. In particular, this gives rise to without power control. This work proposes a new hidden node and exposed node problem. Consider power controlled MAC protocol based on IEEE stations A, B, C and D as shown in figure. 802.11.It saves considerable amount of power and achieves the performance matching with that of IEEE 802.11. Keywords – MANET, MAC (Media Access Control), DCF (Distributed Coordination Function), CSMA (Carrier Sense Multiple Access) I. INTRODUCTION Cooperative ad-hoc networks are formed by several homogeneous wireless stations. All the stations cooperate with each other, i.e., the traffic for the stations that are more than one hop away is routed by the intermediate stations. The intermediate stations Figure .2. Hidden & Exposed node problem are called relaying stations. In the 802.11 protocol, the fundamental mechanism to access the medium is called Distributed III. CSMA/CA Coordination Function (DCF). This is a random The most important part of a MAC protocol access scheme, based on the Carrier Sense Multiple is Channel Access Mechanism. The channel access Access with Collision Avoidance (CSMA/CA) mechanism is way of regulating the use of physical protocol. Retransmission of collided packets is channel among the stations present in the network. It managed according to binary exponential back off specifies when a station can send or receive data on rules. In this research work we limit our investigation the channel. to the DCF scheme. DCF describes two techniques to employ for packet transmission. The default scheme is CSMA/CA (Carrier Sense Multiple Access) a two-way handshaking technique called Basic is derived from CSMA/CD (Collision Detection) Access Mechanism. which is the channel access mechanism used in wired Figure .1. Wireless Ad-hoc Network Ethernets. Since the transmission range of wireless stations is limited, collision cannot be detected directly. This protocols tries to avoid the collision. On arrival of a data packet from LLC, a station senses the channel before transmission and if found idle, starts transmission. If another transmission is going on, the station waits for the length of current transmission, and starts contention. Since the contention is a random time, each station get statistically equal chance to win the contention. 1392 | P a g e
  • 2. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp. IV. IEEE 802.11 OPERATION The IEEE 802.11 MAC offers two kinds of medium access methods, namely Distributed Coordination Function (DCF), and Point Coordination Function (PCF). DCF is the basic access method in 802.11 and requires no infrastructure. The IEEE 802.11 MAC offers two kinds of medium access methods, namely Distributed Coordination Function (DCF), and Point Coordination Function (PCF). DCF is the basic access method in 802.11 and requires no infrastructure. When wireless stations are within transmit range of each other, they form a Basic Service Set (BSS), and can communicate to each other using DCF. If the BSS contains only two stations, it is called Independent Figure .3. CSMA Channel Access Mechanism Basic Service Set (IBSS). Many BSSs may be connected by a Distribution System (DS) to form an CSMA/CA is asynchronous mechanism for Extended Service Set (ESS). An access point (AP) is medium access and does not provide any bandwidth the station that provides access to DS services. guarantee. It’s a best effort service and is suited for packetized applications like TCP/IP. It adapts quite well to the variable traffic conditions and is quite robust against interference. Figure .5. MAC Architecture The IEEE 802.11 MAC is designed for wireless LANs. The requirements of multi-hop ad-hoc networks are more challenging than those of wireless LANs. In this research, we investigate the operation of IEEE 802.11 MAC in centralized multi-hop ad-hoc networks. The terms station and node are used interchangeably throughout the thesis. Multi-hop cooperative wireless ad-hoc networks will be simply referred to as multi-hop networks. Figure .6. Multi-hop Scenario Figure .4. Flow chart of CSMA/CA Consider a multi-hop centralized scenario, as shown in the figure. For convenience, the stations 1393 | P a g e
  • 3. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1392-1400 inside the network are classified into following contention can be decreased by using polling MAC categories: where central station acts as polling station. Central station : is the central controlling station. Most of the traffic in the network is directed towards it. Inner stations : are within one hop boundary of the central station. Boundary stations : are at one hop boundary of the central station. These stations act as relaying stations for the stations outside the reach of central node. Outer stations are outside the communication range of central node. Figure .8. Hybrid PCF-DCF operation IEEE 802.11 SCHEME SPECIFICATION IEEE 802.11 specifies two medium access control protocols, PCF (Point Coordination Function) and DCF (Distributed Coordination Function). PCF is a centralized scheme, whereas DCF is a fully distributed scheme. We consider DCF in this paper.  Transmission range : When a node is within transmission range of a sender node, it can receive and correctly decode packets from the sender node. In our simulations, the transmission range is 250 m when using the highest transmit power level.  Carrier sensing range : Nodes in the carrier sensing range can sense the sender’s transmission. Carrier sensing range is typically larger than the transmission range, for instance, two times larger than the transmission range. In our simulations, the Figure .7. IEEE 802.11 Architecture carrier sensing range is 550 m when using the highest power level. Note that the carrier sensing range and transmission range depend on the V. IEEE 802.11 OPERATION IN MULTI-HOP transmit power level. NETWORKS  Carrier sensing zone : When a node is within the The 802.11 MAC with DCF mode of carrier sensing zone, it can sense the signal but operation is the simplest choice in multi-hop ad hoc cannot decode it correctly. Note that, as per our networks. The reason for the choice of DCF is that it definition here, the carrier sensing zone does not does not require any prior infrastructure. Two or more include transmission range. Nodes in the stations can come together and form an BSS. This transmission range can indeed sense the nature of DCF is very suitable for ad-hoc networks as transmission, but they can also decode it correctly. the ad-hoc networks are simply formed by as set of Therefore, these nodes will not be in the carrier stations coming together. In this section we discuss sensing zone as per our definition. The carrier the operation of 802.11 MAC in multi-hop networks, sensing zone is between 250 m and 550 m with the especially centralized multi-hop ad-hoc networks. highest power level in our simulation. Since the DCF is a contention based distributed protocol, it performs badly in high load conditions. The poor performance of DCF is due to fact that the collisions increase as more and more stations try to access the medium at the same time. It is well known that the polling MAC performs better than pure CSMA/CA under high load conditions. Therefore, 1394 | P a g e
  • 4. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp. Figure .10. System Architecture of an Ad-hoc network Figure .9. Carrier Sensing In contrast to the ad hoc network, infrastructure networks are established to provide VI. MAC SUB LAYER IN IEEE 802.11 wireless users with specific services and range The IEEE standard 802.11 specifies the most extension. Infrastructure networks in the context of famous family of WLANs in which many products are IEEE 802.11 are established using APs. The AP is already available. Standard belongs to the group of analogous to the base station in a cellular 802.x LAN standards, e.g., 802.3 Ethernet or 802.5 communications network. The AP supports range Token Ring. This means that the standard specifies extension by providing the integration points the physical and medium access layer adapted to the necessary for network connectivity between multiple special requirements of wireless LANs, but offers the BSSs, thus forming an extended service set (ESS). same interface as the others to higher layers to The ESS has the appearance of one large BSS to the maintain interoperability. logical link control (LLC) sub layer of each station (STA). The ESS consists of multiple BSSs that are  SYSTEM ARCHITECTURE integrated together using a common distribution The basic service set (BSS) is the system (DS). The DS can be thought of as a backbone fundamental building block of the IEEE 802.11 network that is responsible for MAC-level transport architecture. A BSS is defined as a group of stations of MAC service data units (MSDUs). that are under the direct control of a single coordination function (i.e., a DCF or PCF) which is defined below. The geographical area covered by the BSS is known as the basic service area (BSA), which is analogous to a cell in a cellular communications network. Conceptually, all stations in a BSS can communicate directly with all other stations in a BSS. However, transmission medium degradations due to multipath fading, or interference from nearby BSSs reusing the same physical-layer characteristics (e.g., frequency and spreading code, or hopping pattern), can cause some stations to appear hidden from other stations. An ad hoc network is a deliberate grouping Figure .11. Example of infrastructure network of stations into a single BSS for the purposes of internetworked communications without the aid of an infrastructure network. Given figure is an illustration VII. DCF OPERATION of an independent BSS (IBSS), which is the formal The DCF is the fundamental access method name of an ad hoc network in the IEEE 802.11 used to support asynchronous data transfer on a best standard. Any station can establish a direct effort basis. The DCF is based on CSMA/CA. The communications session with any other station in the carrier sense is performed at both the air interface, BSS, without the requirement of channeling all traffic referred to as physical carrier sensing, and at the MAC through a centralized access point (AP). sub layer, referred to as virtual carrier sensing. Physical carrier sensing detects presence of other 1395 | P a g e
  • 5. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1392-1400 users by analyzing the activity in the channel through the received signal strength. Where, ACK size is the length (in bytes) of an ACK A station performs virtual carrier sense by frame, and Bit Rate is the physical layer’s lowest examining the received MPDU (MAC Protocol Data mandatory rate. Preamble Length is 144 bits and PLCP Unit) information in the header of RTS, CTS and Header Length is 48 bits . Using a 1 Mbps channel bit ACK frames. The stations in BSS use this information rate, EIFS is equal to 364 to adjust their Network Allocation Vector (NAV), μs which indicates amount of time that must elapse until the current transmission is complete and the channel can be sampled again for idle status. Figure .13. NAV duration in transmission range and carrier sensing zone Figure .12. DCF access using RTS/CTS VIII. BASIC POWER CONTROL PROTOCOL A. Inter frame Spacing Different transmit powers used at different IFS is the time interval between frames. IEEE nodes may also result in increased collisions, unless 802.11 defines four IFSs – SIFS (short inter frame some precautions are taken. Suppose nodes A and B space), PIFS (PCF inter frame space), DIFS (DCF use lower power than nodes C and D. When A is inter frame space), and EIFS (extended inter frame transmitting a packet to B, this transmission may not space). The IFSs provide priority levels for accessing be sensed by C and D. So, when C and D transmit to the channel. The SIFS is the shortest of the inter frame each other using a higher power, their transmissions spaces and is used after RTS, CTS, and DATA frames will collide with the on-going transmission from A to to give the highest priority to CTS, DATA and ACK, B. respectively. In DCF, when the channel is idle, a node waits for the DIFS duration before transmitting any packet. In figure, nodes in transmission range correctly set their NAVs when receiving RTS or CTS. However, since nodes in the carrier sensing zone cannot decode the packet, they do not know the duration of the packet transmission. To prevent a collision with the ACK reception at the source node, when nodes detect a transmission and cannot decode it, they set their NAVs for the EIFS duration. The main purpose of the EIFS is to provide enough time for a source node to receive the ACK frame, so the duration of EIFS is longer than that of an ACK Figure .14. Differences in transmit power can lead transmission. As per IEEE 802.11, the EIFS is to increased collisions obtained using the SIFS, the DIFS, and the length of time to transmit an ACK frame at the physical layer’s One simple solution (as a modification to lowest mandatory rate, as the following equation : IEEE 802.11) is to transmit RTS and CTS at the highest possible power level but transmit DATA and EIFS = SIFS+ DIFS+ [ (8·ACKsize) + Preamble ACK at the minimum power level necessary to Length+ PLCP Header Length] / Bit Rate communicate. 1396 | P a g e
  • 6. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp. Figure shows nodes A and B send RTS and using a power level equal to p desired. Similarly, the CTS, respectively, with the highest power level so that transmit power for the ACK transmission is node C receives the CTS and defers its transmission. determined when the destination receives the RTS. By using a lower power for DATA and ACK packets, nodes can conserve energy. Figure .15. Basic Scheme. In the Basic scheme, the RTS–CTS Figure .16. Basic Power Control Protocol. handshake is used to decide the transmission power for subsequent DATA and ACK packets. This can be done in two different ways as described below. Let IX. DEFICIENCY OF THE BASIC PROTOCOL pmax denote the maximum possible transmit power level. In the Basic scheme, RTS and CTS are sent using pmax, and DATA and ACK packets are sent  Suppose that node A wants to send a packet to using the minimum necessary power to reach the destination. When the neighbour nodes receive an node B. Node A transmits the RTS at power level pmax. When B receives the RTS from A RTS or CTS, they set their NAVs for the duration of with signal level pr, B can calculate the the DATA–ACK transmission. When D and E minimum necessary transmission power level, transmit the RTS and CTS, respectively, B and C pdesired, for the DATA packet based on receive the RTS, and F and G receive the CTS, so received power level pr, the transmitted power these nodes will defer their transmissions for the level, pmax, and noise level at the receiver B. duration of the D–E transmission. Node A is in the carrier sensing zone of D (when D transmits at pmax) We can borrow the procedure for estimating so it will only sense the signals and cannot decode the pdesired from. This procedure determines pdesired packets correctly. Node A will set its NAV for EIFS taking into account the current noise level at node B. duration when it senses the RTS transmission from D. Node B then specifies pdesired in its CTS to node A. Similarly, node H will set its NAV for EIFS duration After receiving CTS, node A sends DATA using following CTS transmission from E. power level pdesired. Since the signal-to-noise ratio at When transmit power control is not used, the the receiver B is taken into carrier sensing zone is the same for RTS–CTS and consideration, this method can be accurate in DATA–ACK since all packets are sent using the estimating the appropriate transmit power level for same power level. However, in Basic, when a source DATA. and destination pair decides to reduce the transmit power for DATA–ACK, the transmission range for DATA–ACK is smaller than that of RTS–CTS;  In the second alternative, when a destination similarly, the carrier sensing zone for DATA–ACK is node receives an RTS, it responds by sending a also smaller than that of RTS–CTS. CTS as usual (at power level p max). When the source node receives the CTS, it calculates p desired based on received power level, pr, and transmitted power level (p max), as P desired = p max/pr · Rxthresh · c, where Rxthresh is the minimum necessary received signal strength and c is a constant. We set c equal to 1 in our simulations. Then, the source transmits DATA 1397 | P a g e
  • 7. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1392-1400 Figure .18. PCM periodically increases The key difference between PCM and the Basic Figure .17. Basic Scheme. scheme is that PCM periodically increases the transmit power to pmax during the DATA packet transmission. With this change, nodes that can X. PROPOSED POWER CONTROL MAC potentially interfere with the reception of ACK at the PROTOCOL sender will periodically sense the channel as busy, and Proposed power control MAC (PCM) is defer their own transmission. similar to the Basic scheme in that it uses power level pmax for RTS–CTS and the minimum necessary Since nodes that can sense a transmission but transmit power for DATA–ACK transmissions. We not decode it correctly only defer for EIFS duration, now describe the procedure used in PCM. the transmit power for DATA is increased once every EIFS duration. Also, the interval which the DATA is 1. Source and destination nodes transmit the RTS transmitted at pmax should be larger than the time and CTS using pmax. Nodes in the carrier sensing required for physical carrier sensing. zone set their NAVs for EIFS duration when they sense the signal and cannot decode it correctly. Accordingly, 15 μs should be adequate for carrier sensing, and time required to increase output 2. The source node may transmit DATA using a power (power on) from 10% to 90% of maximum lower power level, similar to the BASIC scheme. power (or power-down from 90% to 10% of maximum power) should be less than 2 μs. Thus, we 3. To avoid a potential collision with the ACK (as believe 20 μs should be enough to power up (2 μs), discussed earlier), the source node transmits DATA at sense the signal (15 μs), and power down (2 μs). In the power level pmax, periodically, for just enough our simulation, EIFS duration is set to 212 μs using a time so that nodes in the carrier sensing zone can 2 Mbps sense it. bit rate. In PCM, a node transmits DATA at pmax every 190 μs for a 20 μs duration. Thus, the interval 4. The destination node transmits an ACK using between the transmissions at pmax is 210 μs, which is the minimum required power to reach the source shorter than EIFS duration. A source node starts node, similar to the BASIC scheme. transmitting DATA at pmax for 20 μs and reduces the Figure shows how the transmit power level transmit power to a power level adequate for the given changes during the sequence of an transmission for 190 μs. Then, it repeats this process RTS–CTS–DATA–ACK transmission. After the during DATA transmission. The node also transmits RTS–CTS handshake using pmax, suppose the source DATA at pmax for the last 20 μs of the transmission. and destination nodes decide to use power level p1 for DATA and ACK. Then, the source will transmit With the above simple modification, PCM DATA using p1 and periodically use pmax. The overcomes the problem of the BASIC scheme and can destination uses p1 for ACK transmission. achieve throughput comparable to 802.11, but uses less energy. However, note that PCM, just like 802.11, does not prevent collisions completely. Specifically, collisions with DATA being received by 1398 | P a g e
  • 8. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp. the destination can occur, as discussed earlier. Our XI. SIMULATION RESULTS goal in this paper is to match the performance of 802.11 while reducing energy consumption. To be The given table shows all the different more conservative in estimating the energy parameters taken into account for conducting the consumption of PCM, we also perform our simulation in NS-2 atmosphere. In this table the simulations where we increase the transmit power values of all the different parameters are shown, using every 170 μs for 40 μs during DATA transmission. which the simulation for aggregate throughput and total data delivered per joule in accordance with Data The proposed power control protocol is modified rate per flow and Packet size is calculated for all three such that in this the Data and ACK is transmitted at schemes namely, BASIC, 802.11 and Proposed lower power level but after a certain duration it is protocol’s. transmitted at higher power level for a very fraction of time, in order to make the neighbouring nodes understand that transmission is going on and they Parameters Values should restrict their transmission during that period so Number of nodes 50 that collision does not take place hence saving power consumption. Simulation Area(m) 800x800 Topology Random Transmission range 50,100,150,200,250 Radio Propagation model Shadowing Traffic model CBR, TCP Packet Size 256,512,1024 bytes Simulation times 150 seconds,300 seconds Bandwidth 2 Mbps Routing DSR A. Simulation Result for Aggregate Throughput vs Data Rate Per Flow Figure .19. Flow chart of Proposed Protocol 1399 | P a g e
  • 9. Rahul Mukherjee / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-august 2012, pp.1392-1400 XII. CONCLUSION B. Simulation Result for Aggregate Throughput vs In the past, MAC protocols that use the Packet Size maximum transmit power for RTS–CTS and the minimum necessary transmit power for DATA–ACK have been proposed with the goal of achieving energy saving. It refer to this as the Basic scheme. However, it is shown that the Basic scheme increases collisions and retransmissions, which can result in more energy consumption and throughput degradation. XIII. REFERENCES [1] E. Pagnani and G. P. Rossi, “Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks,” Mobile Networks and Applications, 5(4), pp. 175-192, 1999. [2] J. Gomez, A.T. Campbell, M. Naghshineh and C. Bisdikian, Conserving transmission power in C. Simulation Result for Data Delivered per Joule wireless ad hoc networks (November 2001). vs Data rate per flow [3] R. Wattenhofer, L. Li, P. Bahl and Y.-M. Wang, Distributed topology control for power efficient operation in multihop wireless ad hoc networks,Vol. 3 pp. 1388–1397 (April 2001). [4] N. Poojary, S.V. Krishnamurthy and S. Dao, Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities, in: Proc. IEEE International Conference on Communications (ICC 2001), Vol. 3 pp. 872–877 (2001). [5] B. Chen, K. Jamieson, H. Balakrishnan and R. Morris, Span: An energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks (July 2001). D. Simulation Result for Data Delivered per joule vs Packet Size Rahul Mukherjee : H.O.D. & Asst Prof. (EC-Deptt), St. Aloysius Institute of Technology (SAIT), Jabalpur, India. Pursuing P.hd in the field of Mobile Adhoc Networks. Published research papers in three international journals. Pursued M.Tech in Communication Systems Engineering from KIIT University, Bhubaneswar. His field of interests comprises of Mobile Technology & Networking. 1400 | P a g e