SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Design and Evaluation o
Techniques i
Prince Kumar
1
M.Tech Scholar
Department of Electronics and Communication Engineering
Universal Institute of Engineering,
ABSTRACT
Wireless communication has become a core part of
modern communication technology.
Infrastructure less wireless network, commonly
referred to as Ad Hoc networks, has attracted
extensive research interest for past 30 years. In this
work, the focus is on IEEE 802.11 network
performance analysis of Multihop hop Ad Hoc
networks under non-saturated network conditions. To
meet the increasing demand of multimedi
necessary to provide the quality of service in such
networks. The current work presents the development
of an analytical model for network performance
analysis.
The medium access mechanism in multihop wireless
networks should minimize collisions, and take care of
the hidden and exposed node problems. The IEEE
802.11 MAC with Distributed Coordination Function
(DCF) does not scale well in such networks. We
introduce Point Coordination Function (PCF) in the
region of high traffic areas, and discuss i
network performance. To improve network scalability
and throughput, we propose the design of a new MAC
called Dual MAC. This work discusses architecture
and working of the dual MAC in detail. Performance
results of the network using dual MAC a
and compared with that of pure DCF operation.
Keywords: Wireless Communication, MAC Protocol,
Multihop ad-hoc wireless networks
INTRODUCTION
In recent times, the wireless networks have become
very popular. Wireless LANs are being deployed on
airports, conferences, etc. People have started using
portable laptops to access Internet and other resources
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Design and Evaluation of MAC Protocol Strateg
Techniques in Wireless Ad Hoc Network
Prince Kumar1
, Rashmi Raj2
M.Tech Scholar, 2
Assistant Professor,
Department of Electronics and Communication Engineering,
ersal Institute of Engineering, Technology, Mohali, Punjab, India
as become a core part of
modern communication technology. The
Infrastructure less wireless network, commonly
networks, has attracted
extensive research interest for past 30 years. In this
work, the focus is on IEEE 802.11 network
performance analysis of Multihop hop Ad Hoc
saturated network conditions. To
meet the increasing demand of multimedia, it is
necessary to provide the quality of service in such
networks. The current work presents the development
of an analytical model for network performance
The medium access mechanism in multihop wireless
and take care of
the hidden and exposed node problems. The IEEE
802.11 MAC with Distributed Coordination Function
(DCF) does not scale well in such networks. We
introduce Point Coordination Function (PCF) in the
region of high traffic areas, and discuss its effect on
network performance. To improve network scalability
and throughput, we propose the design of a new MAC
called Dual MAC. This work discusses architecture
and working of the dual MAC in detail. Performance
results of the network using dual MAC are presented,
and compared with that of pure DCF operation.
Wireless Communication, MAC Protocol,
In recent times, the wireless networks have become
very popular. Wireless LANs are being deployed on
airports, conferences, etc. People have started using
portable laptops to access Internet and other resources
using wireless networks while moving. Another
which has generated a lot of interest recently, is
wireless ad- hoc networks. An ad
formed when two or more stations come together form
an independent network. Ad
termed as infrastructure-less networks since as
not require any prior infrastructure. Two stations that
are within transmission range of each other are called
one hop neighbors. Multihop ad
in which the stations can talk to stations more than one
hop away via intermediate stations. Cooperative ad
networks are formed by several homogeneous wireless
stations. All the stations cooperate with each other, i.e.,
the traffic for the stations that are more than one hop
away is routed by the intermediate stations.
The intermediate stations are called relaying stations.
The following section describes the common Media
Access Control layer used by the 802.11 family of
standards. The 802.11 family uses a MAC layer known
as CSMA/CA (Carrier Sense Multiple
Access/Collision Avoidance) NOTE: Classic Ethernet
uses CSMA/CD - collision detection). CSMA/CA is,
like all Ethernet protocols, peer
requirement for a master station).
transmission process suffers from the hidden terminal
problem and the exposed terminal problem. To
mitigate the above problem additional control packets,
request-to-send and clear-to-send control frames, are
transmitted prior to the exchange of the actual data
frame. A successful exchange of these control packets
ensures that channel is reserved for the time period
enough to complete the data transfer process.
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 434
Protocol Strategies
n Wireless Ad Hoc Network
, India
using wireless networks while moving. Another area
which has generated a lot of interest recently, is
hoc networks. An ad-hoc network is
formed when two or more stations come together form
an independent network. Ad-hoc networks are also
less networks since as they do
not require any prior infrastructure. Two stations that
are within transmission range of each other are called
one hop neighbors. Multihop ad-hoc networks are ones
in which the stations can talk to stations more than one
tations. Cooperative ad-hoc
by several homogeneous wireless
stations. All the stations cooperate with each other, i.e.,
the traffic for the stations that are more than one hop
away is routed by the intermediate stations.
intermediate stations are called relaying stations.
The following section describes the common Media
Access Control layer used by the 802.11 family of
family uses a MAC layer known
as CSMA/CA (Carrier Sense Multiple
voidance) NOTE: Classic Ethernet
collision detection). CSMA/CA is,
like all Ethernet protocols, peer-to-peer (there is no
requirement for a master station).The basic
transmission process suffers from the hidden terminal
ed terminal problem. To
mitigate the above problem additional control packets,
send control frames, are
transmitted prior to the exchange of the actual data
successful exchange of these control packets
nnel is reserved for the time period
enough to complete the data transfer process.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure 1: Basic Mech for data exchange
Between two nodes
1. Original 802.11 Mac
DCF
The DCF is the fundamental access method used to
support asynchronous data transfer on a
basis. The DCF is based on CSMA/CA. The carrier
sense is performed at both the air interface, referred to
as physical carrier sensing, and at the MAC sub layer,
referred to as virtual carrier sensing. Physical carrier
sensing detects presence of other users by analyzing
the activity in the channel through the received signal
strength. A station performs virtual carrier sense by
examining the received MPDU (MAC Protocol Data
Unit) information in the header of RTS, CTS and
ACK frames. The stations in BSS use this information
to adjust their Network Allocation Vector (NAV),
which indicates amount of time that must elapse until
the current transmission is complete and the channel
can be sampled again for idle status. Priority access to
the medium is controlled through the use of
mandatory inter frame space (IFS) time intervals
between the transmissions of frames. Three IFS
intervals are specified in the standard: Short IFS
(SIFS), PCF-IFS (PIFS), and DCF-ISF (DISF).
PCF
The 802.11 MAC offers contention free service by
means of PCF. PCF is optional capability and
provides contention-free (CF) frame transfers. The
PCF relies on the point coordinator (PC) to poll other
stations. The polled stations can send the data without
contending for the medium. In a wireless LAN, the
function of a PC is performed by AP within each
BSS. The PCF is required to coexist with the DCF
and logically sits on the top of DCF (see Figure 3.4).
The PCF consists of alternating contention free period
(CFP), and contention period (CP) as shown in figure
3.6. In the CFP, the PC polls each of the stations
present in the BSS. The PC specifies the start of the
CFP by sending a beacon that contains the length of
CFP duration, among other things. All the sta
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Figure 1: Basic Mech for data exchange
The DCF is the fundamental access method used to
support asynchronous data transfer on a best effort
basis. The DCF is based on CSMA/CA. The carrier
sense is performed at both the air interface, referred to
as physical carrier sensing, and at the MAC sub layer,
referred to as virtual carrier sensing. Physical carrier
of other users by analyzing
the activity in the channel through the received signal
strength. A station performs virtual carrier sense by
examining the received MPDU (MAC Protocol Data
Unit) information in the header of RTS, CTS and
s in BSS use this information
to adjust their Network Allocation Vector (NAV),
which indicates amount of time that must elapse until
the current transmission is complete and the channel
can be sampled again for idle status. Priority access to
controlled through the use of
frame space (IFS) time intervals
between the transmissions of frames. Three IFS
intervals are specified in the standard: Short IFS
ISF (DISF).
The 802.11 MAC offers contention free service by
means of PCF. PCF is optional capability and
free (CF) frame transfers. The
PCF relies on the point coordinator (PC) to poll other
stations. The polled stations can send the data without
contending for the medium. In a wireless LAN, the
function of a PC is performed by AP within each
BSS. The PCF is required to coexist with the DCF
and logically sits on the top of DCF (see Figure 3.4).
The PCF consists of alternating contention free period
(CFP), and contention period (CP) as shown in figure
3.6. In the CFP, the PC polls each of the stations
present in the BSS. The PC specifies the start of the
CFP by sending a beacon that contains the length of
CFP duration, among other things. All the stations in
the BSS set their NAV for the duration of the CFP.
The PC terminates the CFP by sending a CF
frame, and may also terminate it before the advertised
CFP duration. The time difference between two
beacons is called beacon period (BP) or CFP
repetition interval, and is a multiple of beacon frame.
The beacon also helps in synchronization and timing.
The limits on durations of each of the frames are
described in the IEEE 802.11 standard [5]. In the CP,
the stations use DCF to access the medium.
2. Ieee 802.11 Mac Protocol Operation
The IEEE 802.11 MAC offers two kinds of medium
access methods, namely Distributed Coordination
Function (DCF), and Point Coordination Function
(PCF). DCF is the basic access method in 802.11 and
requires no infrastructure. Wh
within transmit range of each other, they form a Basic
Service Set (BSS), and can communicate to each
other using DCF. If the BSS contains only two
stations, it is called Independent Basic Service Set
(IBSS). Many BSSs may be conne
Distribution System (DS) to form an Extended
Service Set (ESS). An access point (AP) is the station
that provides access to DS services. The PCF is built
on the top of the DCF, and is also referred to as
infrastructure mode. It requires a polling
Point Coordinator (PC), which acts as controlling
station during poll. The PCF consists of alternating
Contention Free Periods (CFP) and Contention
Periods (CP). During CFP, the PC polls other stations
in the medium, and during CP, the acce
becomes DCF.
Figure 2 MAC Layer
Mac in Ieee 802.11 In Multihop Scenario
The IEEE 802.11 MAC is designed for wireless
LANs. The requirements of multihop ad
are more challenging than those of wireless LANs.
We will investigate the operation of IEEE 802.11
MAC in centralized multihop ad
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 435
the BSS set their NAV for the duration of the CFP.
The PC terminates the CFP by sending a CF-End
frame, and may also terminate it before the advertised
CFP duration. The time difference between two
beacons is called beacon period (BP) or CFP
ition interval, and is a multiple of beacon frame.
The beacon also helps in synchronization and timing.
The limits on durations of each of the frames are
described in the IEEE 802.11 standard [5]. In the CP,
the stations use DCF to access the medium.
802.11 Mac Protocol Operation
The IEEE 802.11 MAC offers two kinds of medium
access methods, namely Distributed Coordination
Function (DCF), and Point Coordination Function
(PCF). DCF is the basic access method in 802.11 and
requires no infrastructure. When wireless stations are
within transmit range of each other, they form a Basic
Service Set (BSS), and can communicate to each
other using DCF. If the BSS contains only two
stations, it is called Independent Basic Service Set
(IBSS). Many BSSs may be connected by a
Distribution System (DS) to form an Extended
Service Set (ESS). An access point (AP) is the station
that provides access to DS services. The PCF is built
on the top of the DCF, and is also referred to as
infrastructure mode. It requires a polling station called
Point Coordinator (PC), which acts as controlling
station during poll. The PCF consists of alternating
Contention Free Periods (CFP) and Contention
Periods (CP). During CFP, the PC polls other stations
in the medium, and during CP, the access method
Figure 2 MAC Layer
Ieee 802.11 In Multihop Scenario
The IEEE 802.11 MAC is designed for wireless
LANs. The requirements of multihop ad-hoc networks
are more challenging than those of wireless LANs.
peration of IEEE 802.11
MAC in centralized multihop ad-hoc networks. The
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
terms station and node are used interchangeably
throughout the thesis. Multihop cooperative wireless
ad-hoc networks will be simply referred to as
multihop networks
Figure 3: Multihop Scenario
Consider a multihop centralized scenario, as shown in
the figure 3.For convenience; the stations inside the
network are classified into following categories:
Central station is the central controlling station. Most
of the traffic in the network is directed towards it.
Inner stations are within one hop boundary of the
central station. Boundary stations are at one hop
boundary of the central station. These stations act as
relaying stations for the stations outside the reach of
central node. Outer stations are outside the
communication range of central node.
IEEE 802.11 Operations in multihop networks
The 802.11 MAC with DCF mode of operation is the
simplest choice in multihop ad-hoc networks. The
reason for the choice of DCF is that it does n
any prior infrastructure. Two or more stations can
come together and form an BSS. This nature of DCF
is very suitable for ad-hoc networks as the ad
networks are simply formed by as set of stations
coming together. In this section we discuss
operation of 802.11 MAC in multihop networks,
especially centralized multihop ad-hoc networks In a
centralized multihop network, as shown in Figure 4,
the node density in central region is higher than in the
outer region. Most of the traffic is directe
central node and boundary stations act as relaying
stations. Therefore, the traffic near the central station
and its one hop neighbors is very high. Since the DCF
is a contention based distributed protocol, it performs
badly in high load conditions. The poor performance
of DCF is due to fact that the collisions increase as
more and more stations try to access the medium at
the same time. It is well known that the polling
most suitable choice for the polling MAC would be
PCF mode of 802.11, as it is an extension of the DCF
mode. Ebert ET. All [8] have shown that the PCF
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
terms station and node are used interchangeably
throughout the thesis. Multihop cooperative wireless
hoc networks will be simply referred to as
Multihop Scenario
Consider a multihop centralized scenario, as shown in
figure 3.For convenience; the stations inside the
fied into following categories:
Central station is the central controlling station. Most
twork is directed towards it.
Inner stations are within one hop boundary of the
central station. Boundary stations are at one hop
boundary of the central station. These stations act as
relaying stations for the stations outside the reach of
uter stations are outside the
IEEE 802.11 Operations in multihop networks
The 802.11 MAC with DCF mode of operation is the
hoc networks. The
reason for the choice of DCF is that it does not require
any prior infrastructure. Two or more stations can
come together and form an BSS. This nature of DCF
hoc networks as the ad-hoc
networks are simply formed by as set of stations
coming together. In this section we discuss the
operation of 802.11 MAC in multihop networks,
hoc networks In a
centralized multihop network, as shown in Figure 4,
the node density in central region is higher than in the
outer region. Most of the traffic is directed toward the
central node and boundary stations act as relaying
stations. Therefore, the traffic near the central station
and its one hop neighbors is very high. Since the DCF
is a contention based distributed protocol, it performs
tions. The poor performance
of DCF is due to fact that the collisions increase as
more and more stations try to access the medium at
the same time. It is well known that the polling the
most suitable choice for the polling MAC would be
as it is an extension of the DCF
[8] have shown that the PCF
mode performs better than DCF when the number of
stations in WLAN cell is very high. Therefore, we
make the central node as Point Coordinator (PC), and
it polls all the inner and boundary nodes during CFP
period. This differs from conventional PCF operation
in WLANs where PC resides within AP. The outer
stations still perform DCF since the traffic in those
regions is not high. The outer stations can send their
data in contention period (CP) as all the stations
perform DCF during CP. We refer this combination of
PCF and DCF as hybrid operation as shown in
4.
The hybrid operation seems to be an ideal choice in
multihop networks, but it gives rise to following
problems:
The stations that are polled by the Point Coordinator
(PC) keep their NAV set during the CFP period, and
therefore, cannot receive from outer stations. It can
also be said that the boundary nodes become exposed
to PC.
Figure 4 Hybrid PCF-
Outer stations become hidden to PC, and vice versa,
as there is no RTS/CTS exchange between PC and its
one hop neighbors during CFP period.
Problem Description
Simple DCF is not suitable for centralized multihop
network due to collisions at high traffic.
MAC (PCF) is required at the centre of the network to
handle high traffic and reduce collision, but it gives
rise to hidden and exposed node problems. The
solution to both of these problems is provided by
introducing dual Nodes at the boundary of
node.
3. DUAL MAC
Due to these reasons we introduce Dual MAC,
1. The DCF does not work well in high load
scenario.
2. In case of hybrid operation, the polling
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 436
mode performs better than DCF when the number of
stations in WLAN cell is very high. Therefore, we
make the central node as Point Coordinator (PC), and
and boundary nodes during CFP
period. This differs from conventional PCF operation
in WLANs where PC resides within AP. The outer
stations still perform DCF since the traffic in those
regions is not high. The outer stations can send their
n period (CP) as all the stations
perform DCF during CP. We refer this combination of
PCF and DCF as hybrid operation as shown in figure
The hybrid operation seems to be an ideal choice in
multihop networks, but it gives rise to following
stations that are polled by the Point Coordinator
(PC) keep their NAV set during the CFP period, and
therefore, cannot receive from outer stations. It can
also be said that the boundary nodes become exposed
DCF Operations
Outer stations become hidden to PC, and vice versa,
RTS/CTS exchange between PC and its
one hop neighbors during CFP period.
Simple DCF is not suitable for centralized multihop
network due to collisions at high traffic. A polling
MAC (PCF) is required at the centre of the network to
handle high traffic and reduce collision, but it gives
rise to hidden and exposed node problems. The
solution to both of these problems is provided by
introducing dual Nodes at the boundary of the central
Due to these reasons we introduce Dual MAC,
The DCF does not work well in high load
In case of hybrid operation, the polling and NAV
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
setting in PCF nodes cause exposed and hidden
node problems, thereby decrease the th
To improve the throughput, boundary nodes
should be able to receive date from outer nodes
during the CFP period (NAV is set). For this the
MAC should be able to receive even if its NAV is
set. Also, transmissions from outer stations should
not collide with that of PC at boundary stations.
To address above problems, we propose to equip
boundary stations with dual MAC. A dual node is
a station which has two independent MACs each
communicating on different logical channels. The
two MACs are encapsulated inside the dual MAC.
The logical channels could be FDMA or CDMA.
Consider the boundary stations in Figures 4 and 5
that are equipped with dual MACs. One of the
MACs uses the PCF and is termed as PCF MAC.
The second MAC uses the DCF and is termed as
DCF MAC. The PCF MAC communicates with
the PC, and the DCF MAC communicates with
the outer nodes. The exposed and hidden node
problems in central region are eliminated as
follows:
 Boundary stations use the PCF and the DCF on
different channels. Therefore, the transmission of
outer node does not collide with that of PC, and
vice versa.
 The DCF MAC in the dual node can receive from
outer nodes even when the NAV of PCF MAC is
set during CFP period, thereby eliminating
exposed node problem.
Architecture of Dual MAC
Figure 5: Architecture of Dual Mac
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
setting in PCF nodes cause exposed and hidden
node problems, thereby decrease the throughput.
To improve the throughput, boundary nodes
should be able to receive date from outer nodes
during the CFP period (NAV is set). For this the
MAC should be able to receive even if its NAV is
set. Also, transmissions from outer stations should
llide with that of PC at boundary stations.
To address above problems, we propose to equip
boundary stations with dual MAC. A dual node is
a station which has two independent MACs each
communicating on different logical channels. The
ated inside the dual MAC.
The logical channels could be FDMA or CDMA.
Consider the boundary stations in Figures 4 and 5
that are equipped with dual MACs. One of the
MACs uses the PCF and is termed as PCF MAC.
The second MAC uses the DCF and is termed as
F MAC. The PCF MAC communicates with
the PC, and the DCF MAC communicates with
the outer nodes. The exposed and hidden node
problems in central region are eliminated as
Boundary stations use the PCF and the DCF on
he transmission of
outer node does not collide with that of PC, and
The DCF MAC in the dual node can receive from
outer nodes even when the NAV of PCF MAC is
set during CFP period, thereby eliminating
Figure 5: Architecture of Dual Mac Operation
A packet arriving from link layer is received by the
dual MAC and handed over to the MAC at
appropriate frequency. The link layer
MAC address of the next hop destination by using
ARP and hands out the packet to the dual MAC layer
along with the destination MAC address,
MAC, the dual MAC also needs to know the channel
of the destination station. This could be done either by
ARP table maintaining information about the channel
on which the destination stations is communication, or
by maintaining a local list of stations on each channel.
The dual MAC figures out the channel of the
destination MAC and sends out the packet to the
appropriate MAC. The broadcast packets like route
discovery packets and ARP packets are sent to both
the Macs. On receiving a packet from layer, the dual
MAC simply hands it out to the link layer. The
operation of the dual MAC is summarized in
Figure 6 Operation of Dual MAC
4. RESULT & DISCUSSION
Figure 7 Throughput comparison of Dual MAC Vs
DCF MAC in simple scenario
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 437
A packet arriving from link layer is received by the
handed over to the MAC at
appropriate frequency. The link layer find out the
MAC address of the next hop destination by using
hands out the packet to the dual MAC layer
destination MAC address, In case dual
MAC, the dual MAC also needs to know the channel
of the destination station. This could be done either by
ARP table maintaining information about the channel
which the destination stations is communication, or
by maintaining a local list of stations on each channel.
figures out the channel of the
destination MAC and sends out the packet to the
appropriate MAC. The broadcast packets like route
very packets and ARP packets are sent to both
the Macs. On receiving a packet from layer, the dual
MAC simply hands it out to the link layer. The
operation of the dual MAC is summarized in figure 6
Figure 6 Operation of Dual MAC
. RESULT & DISCUSSION
Figure 7 Throughput comparison of Dual MAC Vs
DCF MAC in simple scenario
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Figure 8 Packet Delivery Ratio for Dual MAC Vs
DCF MAC in simple scenario
Figure 9 Dual MAC Vs DCF MAC at
10 packets / sec
Figure 10 Dual MAC Vs DCF MAC at
20 packets / sec
Figure 11 Dual MAC Vs DCF MAC at
30 packets / sec
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Figure 8 Packet Delivery Ratio for Dual MAC Vs
DCF MAC in simple scenario
Figure 9 Dual MAC Vs DCF MAC at
Figure 10 Dual MAC Vs DCF MAC at
Figure 11 Dual MAC Vs DCF MAC at
Figure 12 Dual MAC Vs DCF MAC
Throughput
5. CONCLUSION
The results show that the dual MAC performs
reasonably better than the DCF access mechanism.
However, the dual MAC requires two physical radios
and two separate channels –
another to DCF. We may however, note that the
throughput gain is worth the cost of dual MACs since
only few nodes need to be equipped with dual MAC.
The main focus of this thesis is to suggest a
modification to the existing IEEE 802.11 MAC so as
to make it suitable in multihop ad
especially in the real life centralized networks. The
results presented in the thesis are applicable for static
scenario, nevertheless, the dual MAC is expected to
perform better even under mobile scenario. The effect
of mobility on performance of dual MAC still remains
to be seen.
REFERENCES
1. C. Perkins, Network Working Group, RFC 3220:
IP Mobility Support for IPv4
http://www.ietf.org/rfc/rfc3220.txt
2. Charles E. Perkins ET. all, Mobile Ad Hoc
Networking Working Group,
Distance Vector (AODV) Routing,
http://www.ietf.org/internet
manet-aodv- 12.txt.
3. David B. Johnson, David A. Maltz, Yih
and Jorjeta G. Jetcheva, IETF MANET Working
Group, The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks (DSR),
http://www.ietf.org/internet
manet-dsr-07.txt.
4. Charles E. Perkins, Pravin Bhagwat, Highly
dynamic Destination-Sequenced Distance
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 438
MAC Vs DCF MAC - overall
Throughput
The results show that the dual MAC performs
reasonably better than the DCF access mechanism.
However, the dual MAC requires two physical radios
one bound to PCF and
another to DCF. We may however, note that the
s worth the cost of dual MACs since
only few nodes need to be equipped with dual MAC.
The main focus of this thesis is to suggest a
modification to the existing IEEE 802.11 MAC so as
to make it suitable in multihop ad-hoc networks,
l life centralized networks. The
results presented in the thesis are applicable for static
scenario, nevertheless, the dual MAC is expected to
perform better even under mobile scenario. The effect
of mobility on performance of dual MAC still remains
C. Perkins, Network Working Group, RFC 3220:
IP Mobility Support for IPv4
http://www.ietf.org/rfc/rfc3220.txt.
. all, Mobile Ad Hoc
Networking Working Group, Ad hoc On-Demand
Distance Vector (AODV) Routing,
http://www.ietf.org/internet-drafts/draft-ietf-
David B. Johnson, David A. Maltz, Yih-Chun Hu,
and Jorjeta G. Jetcheva, IETF MANET Working
Group, The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks (DSR),
ww.ietf.org/internet-drafts/draft-ietf-
Charles E. Perkins, Pravin Bhagwat, Highly
Sequenced Distance- Vector
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
routing (DSDV) for mobile computers, ACM
SIGCOMM Computer Communication Review,
v.24 n.4, p.234-244, Oct. 1994.
5. IEEE Std. 802.11, Wireless LAN Media Access
Control (MAC) and Physical Layer
Specifications, 1999.
6. Brian P. Crowe, I. Widjaja, J. Kim, P. Sakai, IEEE
802.11 Wireless Local Area Networks, IEEE
Communications Magazine, September 1997.
7. Phil Karn, MACA - A New Channel Access
Method for Packet Radio, ARRL/CRRL Amature
Radio 9th Computer Networking Group paper
801.22/92-39, March, 1992.
8. Andreas Kopsel, Jean-Pierre Ebert, and Adam
Wolisz, A Performance Comparision of Point and
Distributed Coordination Function of an IEEE
802.11 WLAN in the presence of Real
Requirements, Proc. of 7th Intl. Workshop on
Mobile Multimedia Communications
(MoMuC2000), October 23-26, 2002.
9. Shugong Xu, Tarek Saadawi Does IEEE 802.11
MAC Protocol Work Well in Multihop
Ad Hoc Networks?, IEEE Communications
Magazine, p.130-137, June 2001.
10. Neeraj Poojary, Srikanth V. Krishnamurthy, and
Son Dao, Medium Access Control in a Network of
Ad Hoc Mobile Nodes with Heterogeneous Power
Capabilities, IEEE International Conferenc
Communications (ICC 2001), volume 3, p.872
877, 2001.
11. J. Deng, and Z. J. Haas, Dual Busy Tone Multiple
Access (DBTMA): A New Medium Access
Control for Packet Radio Networks, IEEE
ICUPC’98, Florence, Italy, October 5
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
routing (DSDV) for mobile computers, ACM
SIGCOMM Computer Communication Review,
IEEE Std. 802.11, Wireless LAN Media Access
Control (MAC) and Physical Layer (PHY)
Brian P. Crowe, I. Widjaja, J. Kim, P. Sakai, IEEE
802.11 Wireless Local Area Networks, IEEE
Communications Magazine, September 1997.
A New Channel Access
Method for Packet Radio, ARRL/CRRL Amature
Radio 9th Computer Networking Group paper
Pierre Ebert, and Adam
Wolisz, A Performance Comparision of Point and
Function of an IEEE
802.11 WLAN in the presence of Real-Time
Requirements, Proc. of 7th Intl. Workshop on
Mobile Multimedia Communications
26, 2002.
Shugong Xu, Tarek Saadawi Does IEEE 802.11
MAC Protocol Work Well in Multihop Wireless
Ad Hoc Networks?, IEEE Communications
Neeraj Poojary, Srikanth V. Krishnamurthy, and
Son Dao, Medium Access Control in a Network of
Ad Hoc Mobile Nodes with Heterogeneous Power
Capabilities, IEEE International Conference on
Communications (ICC 2001), volume 3, p.872-
. Haas, Dual Busy Tone Multiple
Medium Access
Control for Packet Radio Networks, IEEE
ICUPC’98, Florence, Italy, October 5-9, 1998.
12. Nasipuri, and S. R. Das. A
protocol for multi-hop wireless networks, Proc. of
IEEE Wireless Communications and Networking
Conference (WCNC’99), September 1999.
13. Asis Nasipuri, and Samir R. Das, Multichannel
CSMA with Signal Power
Selection for Multihop Wireless Networks,
Proceedings of the IEEE Fall Vehicular
Technology Conference (VTC 2000), September
2000.
14. The VINT project, NS notes and documentation,
editors: Kevin Fall and Kannan Varadhan,
http://www.isi.edu/nsnam/ns
15. Ad Kamerman and Leo Monte ban
II: A High-Performance Wireless LAN for the
unlicensed band, 1997.
16. Anurag Kumar Sridhar Iyer, Krishna Paul and
Bhaskar Ramamurthy. Wifire: Medium access
control (mac) and physical layer (phy)
specifications, May 2006
17. LAN/MAN standards Committee. Part 11:
Wireless lan medium access control (mac) and
physical layer (phy) specifications. IEEE
Standards Board, June 2003.
18. LAN/MAN standards Committee, IEEE
Microwave Theory, and Techniques Society.
interface for fixed broadband wireless access
systems. IEEE-SA Standards Board,
19. Spin Documentation.
http://spinroot.com/spin/whatispin.html.
20. Bhaskaran Raman Pravin Bhagavat and Dheeraj
Sanghi. Turning 802.11 inside
SIGCOMM,Jan2004
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 439
Nasipuri, and S. R. Das. A Multichannel CSMA
hop wireless networks, Proc. of
IEEE Wireless Communications and Networking
Conference (WCNC’99), September 1999.
Asis Nasipuri, and Samir R. Das, Multichannel
CSMA with Signal Power-Based Channel
op Wireless Networks,
Proceedings of the IEEE Fall Vehicular
Technology Conference (VTC 2000), September
The VINT project, NS notes and documentation,
editors: Kevin Fall and Kannan Varadhan,
i.edu/nsnam/ns.
Monte ban, Wave LAN-
Performance Wireless LAN for the
Anurag Kumar Sridhar Iyer, Krishna Paul and
Bhaskar Ramamurthy. Wifire: Medium access
control (mac) and physical layer (phy)
LAN/MAN standards Committee. Part 11:
Wireless lan medium access control (mac) and
physical layer (phy) specifications. IEEE-SA
2003.
LAN/MAN standards Committee, IEEE
Microwave Theory, and Techniques Society. Air
interface for fixed broadband wireless access
SA Standards Board, June 2004.
http://spinroot.com/spin/whatispin.html.
Bhaskaran Raman Pravin Bhagavat and Dheeraj
Sanghi. Turning 802.11 inside-out.ACM

More Related Content

What's hot

Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAshok Panwar
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsnGOWTHAMMS6
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsMalik Saad
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetIOSR Journals
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio networkfdr1975
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase thePvrtechnologies Nellore
 

What's hot (20)

Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
Proptotype radio network
Proptotype radio networkProptotype radio network
Proptotype radio network
 
Mn2521592162
Mn2521592162Mn2521592162
Mn2521592162
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
P15
P15P15
P15
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
10
1010
10
 

Similar to Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network

Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...cscpconf
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 

Similar to Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network (20)

networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Design and Evaluation o Techniques i Prince Kumar 1 M.Tech Scholar Department of Electronics and Communication Engineering Universal Institute of Engineering, ABSTRACT Wireless communication has become a core part of modern communication technology. Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedi necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function (DCF) does not scale well in such networks. We introduce Point Coordination Function (PCF) in the region of high traffic areas, and discuss i network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC a and compared with that of pure DCF operation. Keywords: Wireless Communication, MAC Protocol, Multihop ad-hoc wireless networks INTRODUCTION In recent times, the wireless networks have become very popular. Wireless LANs are being deployed on airports, conferences, etc. People have started using portable laptops to access Internet and other resources International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Design and Evaluation of MAC Protocol Strateg Techniques in Wireless Ad Hoc Network Prince Kumar1 , Rashmi Raj2 M.Tech Scholar, 2 Assistant Professor, Department of Electronics and Communication Engineering, ersal Institute of Engineering, Technology, Mohali, Punjab, India as become a core part of modern communication technology. The Infrastructure less wireless network, commonly networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance The medium access mechanism in multihop wireless and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function (DCF) does not scale well in such networks. We introduce Point Coordination Function (PCF) in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Wireless Communication, MAC Protocol, In recent times, the wireless networks have become very popular. Wireless LANs are being deployed on airports, conferences, etc. People have started using portable laptops to access Internet and other resources using wireless networks while moving. Another which has generated a lot of interest recently, is wireless ad- hoc networks. An ad formed when two or more stations come together form an independent network. Ad termed as infrastructure-less networks since as not require any prior infrastructure. Two stations that are within transmission range of each other are called one hop neighbors. Multihop ad in which the stations can talk to stations more than one hop away via intermediate stations. Cooperative ad networks are formed by several homogeneous wireless stations. All the stations cooperate with each other, i.e., the traffic for the stations that are more than one hop away is routed by the intermediate stations. The intermediate stations are called relaying stations. The following section describes the common Media Access Control layer used by the 802.11 family of standards. The 802.11 family uses a MAC layer known as CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) NOTE: Classic Ethernet uses CSMA/CD - collision detection). CSMA/CA is, like all Ethernet protocols, peer requirement for a master station). transmission process suffers from the hidden terminal problem and the exposed terminal problem. To mitigate the above problem additional control packets, request-to-send and clear-to-send control frames, are transmitted prior to the exchange of the actual data frame. A successful exchange of these control packets ensures that channel is reserved for the time period enough to complete the data transfer process. Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 434 Protocol Strategies n Wireless Ad Hoc Network , India using wireless networks while moving. Another area which has generated a lot of interest recently, is hoc networks. An ad-hoc network is formed when two or more stations come together form an independent network. Ad-hoc networks are also less networks since as they do not require any prior infrastructure. Two stations that are within transmission range of each other are called one hop neighbors. Multihop ad-hoc networks are ones in which the stations can talk to stations more than one tations. Cooperative ad-hoc by several homogeneous wireless stations. All the stations cooperate with each other, i.e., the traffic for the stations that are more than one hop away is routed by the intermediate stations. intermediate stations are called relaying stations. The following section describes the common Media Access Control layer used by the 802.11 family of family uses a MAC layer known as CSMA/CA (Carrier Sense Multiple voidance) NOTE: Classic Ethernet collision detection). CSMA/CA is, like all Ethernet protocols, peer-to-peer (there is no requirement for a master station).The basic transmission process suffers from the hidden terminal ed terminal problem. To mitigate the above problem additional control packets, send control frames, are transmitted prior to the exchange of the actual data successful exchange of these control packets nnel is reserved for the time period enough to complete the data transfer process.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Figure 1: Basic Mech for data exchange Between two nodes 1. Original 802.11 Mac DCF The DCF is the fundamental access method used to support asynchronous data transfer on a basis. The DCF is based on CSMA/CA. The carrier sense is performed at both the air interface, referred to as physical carrier sensing, and at the MAC sub layer, referred to as virtual carrier sensing. Physical carrier sensing detects presence of other users by analyzing the activity in the channel through the received signal strength. A station performs virtual carrier sense by examining the received MPDU (MAC Protocol Data Unit) information in the header of RTS, CTS and ACK frames. The stations in BSS use this information to adjust their Network Allocation Vector (NAV), which indicates amount of time that must elapse until the current transmission is complete and the channel can be sampled again for idle status. Priority access to the medium is controlled through the use of mandatory inter frame space (IFS) time intervals between the transmissions of frames. Three IFS intervals are specified in the standard: Short IFS (SIFS), PCF-IFS (PIFS), and DCF-ISF (DISF). PCF The 802.11 MAC offers contention free service by means of PCF. PCF is optional capability and provides contention-free (CF) frame transfers. The PCF relies on the point coordinator (PC) to poll other stations. The polled stations can send the data without contending for the medium. In a wireless LAN, the function of a PC is performed by AP within each BSS. The PCF is required to coexist with the DCF and logically sits on the top of DCF (see Figure 3.4). The PCF consists of alternating contention free period (CFP), and contention period (CP) as shown in figure 3.6. In the CFP, the PC polls each of the stations present in the BSS. The PC specifies the start of the CFP by sending a beacon that contains the length of CFP duration, among other things. All the sta International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Figure 1: Basic Mech for data exchange The DCF is the fundamental access method used to support asynchronous data transfer on a best effort basis. The DCF is based on CSMA/CA. The carrier sense is performed at both the air interface, referred to as physical carrier sensing, and at the MAC sub layer, referred to as virtual carrier sensing. Physical carrier of other users by analyzing the activity in the channel through the received signal strength. A station performs virtual carrier sense by examining the received MPDU (MAC Protocol Data Unit) information in the header of RTS, CTS and s in BSS use this information to adjust their Network Allocation Vector (NAV), which indicates amount of time that must elapse until the current transmission is complete and the channel can be sampled again for idle status. Priority access to controlled through the use of frame space (IFS) time intervals between the transmissions of frames. Three IFS intervals are specified in the standard: Short IFS ISF (DISF). The 802.11 MAC offers contention free service by means of PCF. PCF is optional capability and free (CF) frame transfers. The PCF relies on the point coordinator (PC) to poll other stations. The polled stations can send the data without contending for the medium. In a wireless LAN, the function of a PC is performed by AP within each BSS. The PCF is required to coexist with the DCF and logically sits on the top of DCF (see Figure 3.4). The PCF consists of alternating contention free period (CFP), and contention period (CP) as shown in figure 3.6. In the CFP, the PC polls each of the stations present in the BSS. The PC specifies the start of the CFP by sending a beacon that contains the length of CFP duration, among other things. All the stations in the BSS set their NAV for the duration of the CFP. The PC terminates the CFP by sending a CF frame, and may also terminate it before the advertised CFP duration. The time difference between two beacons is called beacon period (BP) or CFP repetition interval, and is a multiple of beacon frame. The beacon also helps in synchronization and timing. The limits on durations of each of the frames are described in the IEEE 802.11 standard [5]. In the CP, the stations use DCF to access the medium. 2. Ieee 802.11 Mac Protocol Operation The IEEE 802.11 MAC offers two kinds of medium access methods, namely Distributed Coordination Function (DCF), and Point Coordination Function (PCF). DCF is the basic access method in 802.11 and requires no infrastructure. Wh within transmit range of each other, they form a Basic Service Set (BSS), and can communicate to each other using DCF. If the BSS contains only two stations, it is called Independent Basic Service Set (IBSS). Many BSSs may be conne Distribution System (DS) to form an Extended Service Set (ESS). An access point (AP) is the station that provides access to DS services. The PCF is built on the top of the DCF, and is also referred to as infrastructure mode. It requires a polling Point Coordinator (PC), which acts as controlling station during poll. The PCF consists of alternating Contention Free Periods (CFP) and Contention Periods (CP). During CFP, the PC polls other stations in the medium, and during CP, the acce becomes DCF. Figure 2 MAC Layer Mac in Ieee 802.11 In Multihop Scenario The IEEE 802.11 MAC is designed for wireless LANs. The requirements of multihop ad are more challenging than those of wireless LANs. We will investigate the operation of IEEE 802.11 MAC in centralized multihop ad International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 435 the BSS set their NAV for the duration of the CFP. The PC terminates the CFP by sending a CF-End frame, and may also terminate it before the advertised CFP duration. The time difference between two beacons is called beacon period (BP) or CFP ition interval, and is a multiple of beacon frame. The beacon also helps in synchronization and timing. The limits on durations of each of the frames are described in the IEEE 802.11 standard [5]. In the CP, the stations use DCF to access the medium. 802.11 Mac Protocol Operation The IEEE 802.11 MAC offers two kinds of medium access methods, namely Distributed Coordination Function (DCF), and Point Coordination Function (PCF). DCF is the basic access method in 802.11 and requires no infrastructure. When wireless stations are within transmit range of each other, they form a Basic Service Set (BSS), and can communicate to each other using DCF. If the BSS contains only two stations, it is called Independent Basic Service Set (IBSS). Many BSSs may be connected by a Distribution System (DS) to form an Extended Service Set (ESS). An access point (AP) is the station that provides access to DS services. The PCF is built on the top of the DCF, and is also referred to as infrastructure mode. It requires a polling station called Point Coordinator (PC), which acts as controlling station during poll. The PCF consists of alternating Contention Free Periods (CFP) and Contention Periods (CP). During CFP, the PC polls other stations in the medium, and during CP, the access method Figure 2 MAC Layer Ieee 802.11 In Multihop Scenario The IEEE 802.11 MAC is designed for wireless LANs. The requirements of multihop ad-hoc networks are more challenging than those of wireless LANs. peration of IEEE 802.11 MAC in centralized multihop ad-hoc networks. The
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com terms station and node are used interchangeably throughout the thesis. Multihop cooperative wireless ad-hoc networks will be simply referred to as multihop networks Figure 3: Multihop Scenario Consider a multihop centralized scenario, as shown in the figure 3.For convenience; the stations inside the network are classified into following categories: Central station is the central controlling station. Most of the traffic in the network is directed towards it. Inner stations are within one hop boundary of the central station. Boundary stations are at one hop boundary of the central station. These stations act as relaying stations for the stations outside the reach of central node. Outer stations are outside the communication range of central node. IEEE 802.11 Operations in multihop networks The 802.11 MAC with DCF mode of operation is the simplest choice in multihop ad-hoc networks. The reason for the choice of DCF is that it does n any prior infrastructure. Two or more stations can come together and form an BSS. This nature of DCF is very suitable for ad-hoc networks as the ad networks are simply formed by as set of stations coming together. In this section we discuss operation of 802.11 MAC in multihop networks, especially centralized multihop ad-hoc networks In a centralized multihop network, as shown in Figure 4, the node density in central region is higher than in the outer region. Most of the traffic is directe central node and boundary stations act as relaying stations. Therefore, the traffic near the central station and its one hop neighbors is very high. Since the DCF is a contention based distributed protocol, it performs badly in high load conditions. The poor performance of DCF is due to fact that the collisions increase as more and more stations try to access the medium at the same time. It is well known that the polling most suitable choice for the polling MAC would be PCF mode of 802.11, as it is an extension of the DCF mode. Ebert ET. All [8] have shown that the PCF International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 terms station and node are used interchangeably throughout the thesis. Multihop cooperative wireless hoc networks will be simply referred to as Multihop Scenario Consider a multihop centralized scenario, as shown in figure 3.For convenience; the stations inside the fied into following categories: Central station is the central controlling station. Most twork is directed towards it. Inner stations are within one hop boundary of the central station. Boundary stations are at one hop boundary of the central station. These stations act as relaying stations for the stations outside the reach of uter stations are outside the IEEE 802.11 Operations in multihop networks The 802.11 MAC with DCF mode of operation is the hoc networks. The reason for the choice of DCF is that it does not require any prior infrastructure. Two or more stations can come together and form an BSS. This nature of DCF hoc networks as the ad-hoc networks are simply formed by as set of stations coming together. In this section we discuss the operation of 802.11 MAC in multihop networks, hoc networks In a centralized multihop network, as shown in Figure 4, the node density in central region is higher than in the outer region. Most of the traffic is directed toward the central node and boundary stations act as relaying stations. Therefore, the traffic near the central station and its one hop neighbors is very high. Since the DCF is a contention based distributed protocol, it performs tions. The poor performance of DCF is due to fact that the collisions increase as more and more stations try to access the medium at the same time. It is well known that the polling the most suitable choice for the polling MAC would be as it is an extension of the DCF [8] have shown that the PCF mode performs better than DCF when the number of stations in WLAN cell is very high. Therefore, we make the central node as Point Coordinator (PC), and it polls all the inner and boundary nodes during CFP period. This differs from conventional PCF operation in WLANs where PC resides within AP. The outer stations still perform DCF since the traffic in those regions is not high. The outer stations can send their data in contention period (CP) as all the stations perform DCF during CP. We refer this combination of PCF and DCF as hybrid operation as shown in 4. The hybrid operation seems to be an ideal choice in multihop networks, but it gives rise to following problems: The stations that are polled by the Point Coordinator (PC) keep their NAV set during the CFP period, and therefore, cannot receive from outer stations. It can also be said that the boundary nodes become exposed to PC. Figure 4 Hybrid PCF- Outer stations become hidden to PC, and vice versa, as there is no RTS/CTS exchange between PC and its one hop neighbors during CFP period. Problem Description Simple DCF is not suitable for centralized multihop network due to collisions at high traffic. MAC (PCF) is required at the centre of the network to handle high traffic and reduce collision, but it gives rise to hidden and exposed node problems. The solution to both of these problems is provided by introducing dual Nodes at the boundary of node. 3. DUAL MAC Due to these reasons we introduce Dual MAC, 1. The DCF does not work well in high load scenario. 2. In case of hybrid operation, the polling International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 436 mode performs better than DCF when the number of stations in WLAN cell is very high. Therefore, we make the central node as Point Coordinator (PC), and and boundary nodes during CFP period. This differs from conventional PCF operation in WLANs where PC resides within AP. The outer stations still perform DCF since the traffic in those regions is not high. The outer stations can send their n period (CP) as all the stations perform DCF during CP. We refer this combination of PCF and DCF as hybrid operation as shown in figure The hybrid operation seems to be an ideal choice in multihop networks, but it gives rise to following stations that are polled by the Point Coordinator (PC) keep their NAV set during the CFP period, and therefore, cannot receive from outer stations. It can also be said that the boundary nodes become exposed DCF Operations Outer stations become hidden to PC, and vice versa, RTS/CTS exchange between PC and its one hop neighbors during CFP period. Simple DCF is not suitable for centralized multihop network due to collisions at high traffic. A polling MAC (PCF) is required at the centre of the network to handle high traffic and reduce collision, but it gives rise to hidden and exposed node problems. The solution to both of these problems is provided by introducing dual Nodes at the boundary of the central Due to these reasons we introduce Dual MAC, The DCF does not work well in high load In case of hybrid operation, the polling and NAV
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com setting in PCF nodes cause exposed and hidden node problems, thereby decrease the th To improve the throughput, boundary nodes should be able to receive date from outer nodes during the CFP period (NAV is set). For this the MAC should be able to receive even if its NAV is set. Also, transmissions from outer stations should not collide with that of PC at boundary stations. To address above problems, we propose to equip boundary stations with dual MAC. A dual node is a station which has two independent MACs each communicating on different logical channels. The two MACs are encapsulated inside the dual MAC. The logical channels could be FDMA or CDMA. Consider the boundary stations in Figures 4 and 5 that are equipped with dual MACs. One of the MACs uses the PCF and is termed as PCF MAC. The second MAC uses the DCF and is termed as DCF MAC. The PCF MAC communicates with the PC, and the DCF MAC communicates with the outer nodes. The exposed and hidden node problems in central region are eliminated as follows:  Boundary stations use the PCF and the DCF on different channels. Therefore, the transmission of outer node does not collide with that of PC, and vice versa.  The DCF MAC in the dual node can receive from outer nodes even when the NAV of PCF MAC is set during CFP period, thereby eliminating exposed node problem. Architecture of Dual MAC Figure 5: Architecture of Dual Mac International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 setting in PCF nodes cause exposed and hidden node problems, thereby decrease the throughput. To improve the throughput, boundary nodes should be able to receive date from outer nodes during the CFP period (NAV is set). For this the MAC should be able to receive even if its NAV is set. Also, transmissions from outer stations should llide with that of PC at boundary stations. To address above problems, we propose to equip boundary stations with dual MAC. A dual node is a station which has two independent MACs each communicating on different logical channels. The ated inside the dual MAC. The logical channels could be FDMA or CDMA. Consider the boundary stations in Figures 4 and 5 that are equipped with dual MACs. One of the MACs uses the PCF and is termed as PCF MAC. The second MAC uses the DCF and is termed as F MAC. The PCF MAC communicates with the PC, and the DCF MAC communicates with the outer nodes. The exposed and hidden node problems in central region are eliminated as Boundary stations use the PCF and the DCF on he transmission of outer node does not collide with that of PC, and The DCF MAC in the dual node can receive from outer nodes even when the NAV of PCF MAC is set during CFP period, thereby eliminating Figure 5: Architecture of Dual Mac Operation A packet arriving from link layer is received by the dual MAC and handed over to the MAC at appropriate frequency. The link layer MAC address of the next hop destination by using ARP and hands out the packet to the dual MAC layer along with the destination MAC address, MAC, the dual MAC also needs to know the channel of the destination station. This could be done either by ARP table maintaining information about the channel on which the destination stations is communication, or by maintaining a local list of stations on each channel. The dual MAC figures out the channel of the destination MAC and sends out the packet to the appropriate MAC. The broadcast packets like route discovery packets and ARP packets are sent to both the Macs. On receiving a packet from layer, the dual MAC simply hands it out to the link layer. The operation of the dual MAC is summarized in Figure 6 Operation of Dual MAC 4. RESULT & DISCUSSION Figure 7 Throughput comparison of Dual MAC Vs DCF MAC in simple scenario International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 437 A packet arriving from link layer is received by the handed over to the MAC at appropriate frequency. The link layer find out the MAC address of the next hop destination by using hands out the packet to the dual MAC layer destination MAC address, In case dual MAC, the dual MAC also needs to know the channel of the destination station. This could be done either by ARP table maintaining information about the channel which the destination stations is communication, or by maintaining a local list of stations on each channel. figures out the channel of the destination MAC and sends out the packet to the appropriate MAC. The broadcast packets like route very packets and ARP packets are sent to both the Macs. On receiving a packet from layer, the dual MAC simply hands it out to the link layer. The operation of the dual MAC is summarized in figure 6 Figure 6 Operation of Dual MAC . RESULT & DISCUSSION Figure 7 Throughput comparison of Dual MAC Vs DCF MAC in simple scenario
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Figure 8 Packet Delivery Ratio for Dual MAC Vs DCF MAC in simple scenario Figure 9 Dual MAC Vs DCF MAC at 10 packets / sec Figure 10 Dual MAC Vs DCF MAC at 20 packets / sec Figure 11 Dual MAC Vs DCF MAC at 30 packets / sec International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Figure 8 Packet Delivery Ratio for Dual MAC Vs DCF MAC in simple scenario Figure 9 Dual MAC Vs DCF MAC at Figure 10 Dual MAC Vs DCF MAC at Figure 11 Dual MAC Vs DCF MAC at Figure 12 Dual MAC Vs DCF MAC Throughput 5. CONCLUSION The results show that the dual MAC performs reasonably better than the DCF access mechanism. However, the dual MAC requires two physical radios and two separate channels – another to DCF. We may however, note that the throughput gain is worth the cost of dual MACs since only few nodes need to be equipped with dual MAC. The main focus of this thesis is to suggest a modification to the existing IEEE 802.11 MAC so as to make it suitable in multihop ad especially in the real life centralized networks. The results presented in the thesis are applicable for static scenario, nevertheless, the dual MAC is expected to perform better even under mobile scenario. The effect of mobility on performance of dual MAC still remains to be seen. REFERENCES 1. C. Perkins, Network Working Group, RFC 3220: IP Mobility Support for IPv4 http://www.ietf.org/rfc/rfc3220.txt 2. Charles E. Perkins ET. all, Mobile Ad Hoc Networking Working Group, Distance Vector (AODV) Routing, http://www.ietf.org/internet manet-aodv- 12.txt. 3. David B. Johnson, David A. Maltz, Yih and Jorjeta G. Jetcheva, IETF MANET Working Group, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), http://www.ietf.org/internet manet-dsr-07.txt. 4. Charles E. Perkins, Pravin Bhagwat, Highly dynamic Destination-Sequenced Distance International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 438 MAC Vs DCF MAC - overall Throughput The results show that the dual MAC performs reasonably better than the DCF access mechanism. However, the dual MAC requires two physical radios one bound to PCF and another to DCF. We may however, note that the s worth the cost of dual MACs since only few nodes need to be equipped with dual MAC. The main focus of this thesis is to suggest a modification to the existing IEEE 802.11 MAC so as to make it suitable in multihop ad-hoc networks, l life centralized networks. The results presented in the thesis are applicable for static scenario, nevertheless, the dual MAC is expected to perform better even under mobile scenario. The effect of mobility on performance of dual MAC still remains C. Perkins, Network Working Group, RFC 3220: IP Mobility Support for IPv4 http://www.ietf.org/rfc/rfc3220.txt. . all, Mobile Ad Hoc Networking Working Group, Ad hoc On-Demand Distance Vector (AODV) Routing, http://www.ietf.org/internet-drafts/draft-ietf- David B. Johnson, David A. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva, IETF MANET Working Group, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), ww.ietf.org/internet-drafts/draft-ietf- Charles E. Perkins, Pravin Bhagwat, Highly Sequenced Distance- Vector
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com routing (DSDV) for mobile computers, ACM SIGCOMM Computer Communication Review, v.24 n.4, p.234-244, Oct. 1994. 5. IEEE Std. 802.11, Wireless LAN Media Access Control (MAC) and Physical Layer Specifications, 1999. 6. Brian P. Crowe, I. Widjaja, J. Kim, P. Sakai, IEEE 802.11 Wireless Local Area Networks, IEEE Communications Magazine, September 1997. 7. Phil Karn, MACA - A New Channel Access Method for Packet Radio, ARRL/CRRL Amature Radio 9th Computer Networking Group paper 801.22/92-39, March, 1992. 8. Andreas Kopsel, Jean-Pierre Ebert, and Adam Wolisz, A Performance Comparision of Point and Distributed Coordination Function of an IEEE 802.11 WLAN in the presence of Real Requirements, Proc. of 7th Intl. Workshop on Mobile Multimedia Communications (MoMuC2000), October 23-26, 2002. 9. Shugong Xu, Tarek Saadawi Does IEEE 802.11 MAC Protocol Work Well in Multihop Ad Hoc Networks?, IEEE Communications Magazine, p.130-137, June 2001. 10. Neeraj Poojary, Srikanth V. Krishnamurthy, and Son Dao, Medium Access Control in a Network of Ad Hoc Mobile Nodes with Heterogeneous Power Capabilities, IEEE International Conferenc Communications (ICC 2001), volume 3, p.872 877, 2001. 11. J. Deng, and Z. J. Haas, Dual Busy Tone Multiple Access (DBTMA): A New Medium Access Control for Packet Radio Networks, IEEE ICUPC’98, Florence, Italy, October 5 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 routing (DSDV) for mobile computers, ACM SIGCOMM Computer Communication Review, IEEE Std. 802.11, Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Brian P. Crowe, I. Widjaja, J. Kim, P. Sakai, IEEE 802.11 Wireless Local Area Networks, IEEE Communications Magazine, September 1997. A New Channel Access Method for Packet Radio, ARRL/CRRL Amature Radio 9th Computer Networking Group paper Pierre Ebert, and Adam Wolisz, A Performance Comparision of Point and Function of an IEEE 802.11 WLAN in the presence of Real-Time Requirements, Proc. of 7th Intl. Workshop on Mobile Multimedia Communications 26, 2002. Shugong Xu, Tarek Saadawi Does IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?, IEEE Communications Neeraj Poojary, Srikanth V. Krishnamurthy, and Son Dao, Medium Access Control in a Network of Ad Hoc Mobile Nodes with Heterogeneous Power Capabilities, IEEE International Conference on Communications (ICC 2001), volume 3, p.872- . Haas, Dual Busy Tone Multiple Medium Access Control for Packet Radio Networks, IEEE ICUPC’98, Florence, Italy, October 5-9, 1998. 12. Nasipuri, and S. R. Das. A protocol for multi-hop wireless networks, Proc. of IEEE Wireless Communications and Networking Conference (WCNC’99), September 1999. 13. Asis Nasipuri, and Samir R. Das, Multichannel CSMA with Signal Power Selection for Multihop Wireless Networks, Proceedings of the IEEE Fall Vehicular Technology Conference (VTC 2000), September 2000. 14. The VINT project, NS notes and documentation, editors: Kevin Fall and Kannan Varadhan, http://www.isi.edu/nsnam/ns 15. Ad Kamerman and Leo Monte ban II: A High-Performance Wireless LAN for the unlicensed band, 1997. 16. Anurag Kumar Sridhar Iyer, Krishna Paul and Bhaskar Ramamurthy. Wifire: Medium access control (mac) and physical layer (phy) specifications, May 2006 17. LAN/MAN standards Committee. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Standards Board, June 2003. 18. LAN/MAN standards Committee, IEEE Microwave Theory, and Techniques Society. interface for fixed broadband wireless access systems. IEEE-SA Standards Board, 19. Spin Documentation. http://spinroot.com/spin/whatispin.html. 20. Bhaskaran Raman Pravin Bhagavat and Dheeraj Sanghi. Turning 802.11 inside SIGCOMM,Jan2004 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 439 Nasipuri, and S. R. Das. A Multichannel CSMA hop wireless networks, Proc. of IEEE Wireless Communications and Networking Conference (WCNC’99), September 1999. Asis Nasipuri, and Samir R. Das, Multichannel CSMA with Signal Power-Based Channel op Wireless Networks, Proceedings of the IEEE Fall Vehicular Technology Conference (VTC 2000), September The VINT project, NS notes and documentation, editors: Kevin Fall and Kannan Varadhan, i.edu/nsnam/ns. Monte ban, Wave LAN- Performance Wireless LAN for the Anurag Kumar Sridhar Iyer, Krishna Paul and Bhaskar Ramamurthy. Wifire: Medium access control (mac) and physical layer (phy) LAN/MAN standards Committee. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE-SA 2003. LAN/MAN standards Committee, IEEE Microwave Theory, and Techniques Society. Air interface for fixed broadband wireless access SA Standards Board, June 2004. http://spinroot.com/spin/whatispin.html. Bhaskaran Raman Pravin Bhagavat and Dheeraj Sanghi. Turning 802.11 inside-out.ACM