The document presents a new Collision Based Contention (CBC) MAC protocol for mobile ad hoc networks.
The CBC protocol aims to improve throughput by dynamically adjusting the contention window size based on the current collision level, rather than using a fixed binary exponential backoff as in 802.11. Under CBC, the contention window is incremented or decremented by varying factors depending on the number of consecutive collisions or successes. This allows the window size to better reflect current network conditions compared to alternatives like MILD, MIMD, and AETF. Simulation results showed CBC outperforms 802.11 BEB and other proposals in terms of throughput, fairness, and delay.
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
TCP is one of the main protocols that govern the Internet traffic nowadays. However, it suffers significant
performance degradation over wireless links. Since wireless networks are leading the communication
technologies recently, it is imperative to introduce effective solutions for the TCP congestion control
mechanisms over such networks. In this research four End-to-End TCP implementations are discussed,
they are TCP Westwood, Hybla, Highspeed, and NewReno. The performance of these variants is compared
using LTE emulated environment in terms of throughput, delay, and fairness. Ns-3 simulator is used to
simulate the LTE networks environment. The simulation results showed that TCP Highspeed achieves the
best throughput results. Although TCP Westwood recorded the lowest latency values comparing to others,
it behaved unfairly among different traffic flows. Moreover, TCP Hybla demonstrated the best fairness
behaviour among other TCP variants
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
At present day’s wireless sensor networks, obtain a lot consideration to researchers. Maximum number of sensor nodes are scattered that can communicate with all others. Reliable data communication and energy consumption are the mainly significant parameters that are required in wireless sensor networks. Many of MAC protocols have been planned to improve the efficiency more by enhancing the throughput and energy consumption. The majority of the presented medium access control protocols to only make available, reliable data delivery or energy efficiency does not offer together at the same time. In this research work the author proposes a novel approach based on Receiver Centric-MAC is implemented using NS2 simulator. Here, the author focuses on the following parametric measures like - energy consumption, reliability and bandwidth. RC-MAC provides high bandwidth without decreasing energy efficiency. The results show that 0.12% of less energy consumption, reliability improved by 20.86% and bandwidth increased by 27.32% of RC-MAC compared with MAC IEEE 802.11.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
TCP is one of the main protocols that govern the Internet traffic nowadays. However, it suffers significant
performance degradation over wireless links. Since wireless networks are leading the communication
technologies recently, it is imperative to introduce effective solutions for the TCP congestion control
mechanisms over such networks. In this research four End-to-End TCP implementations are discussed,
they are TCP Westwood, Hybla, Highspeed, and NewReno. The performance of these variants is compared
using LTE emulated environment in terms of throughput, delay, and fairness. Ns-3 simulator is used to
simulate the LTE networks environment. The simulation results showed that TCP Highspeed achieves the
best throughput results. Although TCP Westwood recorded the lowest latency values comparing to others,
it behaved unfairly among different traffic flows. Moreover, TCP Hybla demonstrated the best fairness
behaviour among other TCP variants
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Abstract The Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based Medium Access Control (MAC) protocol uses a short request-to-send (RTS) and clear-to-send (CTS) control packets prior of actual data packet transmission. The function of the CSMA/CA based MAC protocol in wireless communication is to facilitate wireless nodes (i.e. laptop, PC, smart phones and etc) to access a wireless medium efficiently. Besides, it is also efficiently manage the wireless medium when more wireless nodes involving in transmission activity in the network. This protocol allows all wireless nodes in the network to communicate between each other without collision. Since collisions may only occurred on the RTS control packets thus it can reduce the actual data collision on the medium. The RTS/CTS control handshake provides better performance and reduce the duration of collision especially when long data packets are transmitted over wireless medium. However, even though the CSMA/CA based MAC protocol working effectively and provides better throughput performance over single hop communication but it performance degrade significantly when directly applied in multihop Wireless Mesh Network (WMN). The reason behind this poor performance is due to the inefficient packet delivery of CSMA/CA based MAC protocol in multihop network. The exchange of RTS and CTS signaling that required at each hop throughout the multihop network eventually will cause the large overheads and subsequently degrade network throughput. Therefore, in this paper, an enhancement of RTS/CTS handshake has been proposed in order reduces the signaling overheads and ultimately allows a smooth packet delivery in the multihop network without any collision. In this work, the multihop network performances are evaluated analytically in terms of throughput and overhead. It is proven that the new method of RTS/CTS handshake provides significant improvement in throughput and overhead. Keywords: Medium Access Control (MAC) protocol; Signaling; Overheads; Multihop communication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
we find out various power aware and data packet rate control with-collision-avoidance (CSMA/CA)-based ad hoc wireless network communication. And identifies that CSMA
Recently proposed wireless mesh routing metrics
based on awareness of congestion, load or interference typically
employ queue occupancy of a node's wireless interface to
estimate traffic load. Queue occupancy, however, does not
directly reflect the impact of channel contention from neighbor
nodes. We propose an alternative called the channel load-aware
(CLAW) routing metric that takes into consideration not only
the traffic load within the node itself, but also the degree of
interference and contention within the channel. CLAW uses
local information from a node's MAC layer to estimate channel
busyness and contention levels. It does not require complex
computations, nor the exchange of link-level statistics with
neighbors. Our preliminary results show that CLAW can
identify congested regions within the network and thus enable
the determination of routes around these congested areas. We
present the results of simulations we conducted to evaluate the
use of CLAW in mesh-wide routing.
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
Mobile ad hoc Network (MANET) is an assortment of mobile nodes that area unit needed to transmit packets on behalf of every alternative. The mobile nodes maintain the topology data during a dynamic network among a selected vary. All nodes should remember of its neighbors that area unit directly approachable. The every node in network maintained next hop data of close neighbor nodes. The routing protocols area unit routed knowledge packets in between sender and receiver during a specific time instant. The time synchronization is maintained the communication clock cycle between the nodes. Time synchronization is an important element of a MANET. Time synchronization during a network aims at providing a typical duration for local clocks of nodes within the network. Since all hardware clocks area unit imperfect, local clocks of nodes could alienate from one another in time, thus determined time or durations of your
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Control Channel Dilemma (CCD) is still an open problem for Cognitive Radio Network (CRN). In this
article, we investigate and present a novel solution of Distributed Coordination in CRN to mitigate the
necessity for a common control channel. This scheme is based on the fact that a group of nearby nodes
almost detects the same frequency spectrum. That will allow every group of close nodes to choose a node
called coordinator, which in its turn chooses a reliable control channel for the group, then the reaming
nodes become slaves. Furthermore, the nodes that belong to two or more groups have an important role in
maintaining the network connectivity since they act as bridges to relay data between different groups. The
proposed approach carries potentials to provide robust operation under network dynamics conditions.
Finally, several simulation experiments are presented to validate the proposed approach.
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A secure qos distributed routing protocol for hybrid wireless networksAAKASH S
The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service
(QoS) requirements in real time transmission for wireless application. But it stream including critical mission
application like military use or emergency recovery. Hybrid wireless networks is unified mobile ad-hoc network
(MANET) and wireless infrastructure networks. It inherits invalid reservation and race condition problem in
Mobile ad-hoc network (MANET). Whereas open medium and wide distribution of node make vulnerable to
malicious attackers in Hybrid wireless networks. How to secure the Quality of Service (QoS) routing in Hybrid
wireless networks. In this paper, we propose a Secure QoS-Oriented Distributed routing protocol (SQOD) to
upgrade the secure Quality of Service (QoS) routing in Hybrid wireless networks. SQOD contain two
contrivances: 1.QoS-Oriented Distributed Routing Protocol (QOD)-to reduce transmission delay, transmission
time. And also increase wireless network transmission throughput. 2. Enhanced Adaptive ACKnowledgment
(EAACK)-implement a new intrusion-detection system for Hybrid wireless networks. It protect Hybrid wireless
networks from attacks that have higher malicious behavior detection rate. Analytical and simulation result
based on the real human mobility mode. SQOD can provide high secure performance in terms of Intrusion detection,overhead, transmission delay.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
Cooperative communication, that utilizes near terminals to relay the overhearing
information to grasp the variability gains, choices a nice potential to strengthen the transmission
potency in wireless networks. to the subsume the hard medium access interactions evoked by relaying
and leverage the advantages of such cooperation, associate economical Cooperative Medium Access
management (CMAC) protocol is required. throughout this paper, we've got an inclination to tend to
propose a completely unique cross-layer Wide unfold Energy-adaptive Location-based CMAC
protocol, notably WEAL-CMAC, for Mobile Ad-hoc Networks (MANETs). the design objective of
WEAL-CMAC is to strengthen the performance of the MANETs in terms of network amount and
energy potency. a wise energy consumption model is used throughout this paper, that takes the energy
consumption on each transceiver instrumentation and transmit instrumentation into thought. A
distributed utility-based best relay different strategy is incorporated, that selects the most effective
relay supported location information and residual energy. moreover, with the aim of enhancing the
spacial apply, associate innovative network allocation vector setting is provided to the subsume the
variable transmission power of the beginning and relay terminals. we've got an inclination to tend to
point that the planned WEAL-CMAC considerably prolongs the network amount below varied
circumstances even for prime instrumentation energy consumption cases by comprehensive simulation
study
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...IJCNCJournal
Vehicle-to-Everything communications (V2X) are becoming increasingly popular as a solution for safer roads and better traffic management. One of the essential protocols in V2X is the Dedicated Short Range Communication (DSRC) protocol suite. DSRC includes the IEEE 802.11p protocol that operates at the medium access control (MAC) and physical (PHY) layers. Upon collision, the IEEE 802.11p MAC layer applies a carrier sense multiple access/collision avoidance (CSMA/CA) mechanism that randomly selects a backoff time to re-check the channel activity and then retransmit. However, the random selection of the backoff time may lead to further packet collisions that decrease the utilization of the communication channel, which suffers from a limited bandwidth in the first place. This paper proposes a fuzzy model based on rational decision-making, which we call F-802.11p, to improve the IEEE 802.11p protocol backoff time selection by limiting the IEEE 802.11p beacon messages to better use of the available bandwidth. A simulation study presents the evaluation of our work compared to IEEE 802.11p. We deployed the simulation software in two scenarios: the Veins Framework map and the map of New Administrative Cairo in Egypt. We base our comparison on slots backoff, times into backoff, PHY busy time, MAC busy time, total lost packets, and generated/received beacon messages. Simulation results show that both protocols have comparable results in slots backoff, times into back off, and the generated beacon messages. At the same time, our F-802.11p significantly outperforms the IEEE 802.11p in PHY busy time, MAC busy time, total lost packets, and the received beacon messages in both scenarios.
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...IJCNCJournal
Vehicle-to-Everything communications (V2X) are becoming increasingly popular as a solution for safer
roads and better traffic management. One of the essential protocols in V2X is the Dedicated Short Range
Communication (DSRC) protocol suite. DSRC includes the IEEE 802.11p protocol that operates at the
medium access control (MAC) and physical (PHY) layers. Upon collision, the IEEE 802.11p MAC layer
applies a carrier sense multiple access/collision avoidance (CSMA/CA) mechanism that randomly selects a
backoff time to re-check the channel activity and then retransmit. However, the random selection of the
backoff time may lead to further packet collisions that decrease the utilization of the communication
channel, which suffers from a limited bandwidth in the first place. This paper proposes a fuzzy model based
on rational decision-making, which we call F-802.11p, to improve the IEEE 802.11p protocol backoff time
selection by limiting the IEEE 802.11p beacon messages to better use of the available bandwidth. A
simulation study presents the evaluation of our work compared to IEEE 802.11p. We deployed the
simulation software in two scenarios: the Veins Framework map and the map of New Administrative Cairo
in Egypt. We base our comparison on slots backoff, times into backoff, PHY busy time, MAC busy time,
total lost packets, and generated/received beacon messages. Simulation results show that both protocols
have comparable results in slots backoff, times into back off, and the generated beacon messages. At the
same time, our F-802.11p significantly outperforms the IEEE 802.11p in PHY busy time, MAC busy time,
total lost packets, and the received beacon messages in both scenarios.
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
In this paper, the implementation and analysis of RTS/CTS mechanism for data transfer in wireless
network is being studied. The Request-To-Send (RTS) and Clear-To-Send (CTS) mechanism is widely used in
wireless networks to avoid collisions due to hidden nodes by reserving the channel for transmitting data from
source to destination. The collisions caused by the hidden nodes reduce the network throughput and efficiency.
In RTS/CTS mechanism, RTS/CTS packets set the timer for the neighboring nodes so that these nodes defer their
transmission for the entire data packet transmission period. But there may be the case when the intended
transmission completes before the expiration of this timer, so a kind of delay has been developed. To reduce this
delay, the proposed methodology in this paper provides RTR (Ready-To-Receive) packets along with RTS/CTS
packets. The receiving node sends RTR packets to notify all the neighboring nodes that the intended
communication has finished. The results show that this method improves the data transfer rate resulting in
higher throughput and network efficiency and the system will be more efficient. This will reflect in the overall
information transfer time.
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
When packets are sending in multi-hop mobile unintended networks numerous problems occur like
flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of
packets simultaneously in MANETs that using the slot assignments approach, when additional channels are
transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of
the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and
therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the
mobile ad hoc network for collision control and reliable communication. This paper proposes two new
broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of
efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced
performance within the different environments. Evaluation of simulation results with other well-known
exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best
within the wireless network and channel bandwidths are well utilized within the network.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
Mobile Ad-hoc network(MANET) is a collection of wireless terminals that are able to dynamically form a temporary network. To establish such a network no fixed infrastructure is required. Here, it is the responsibility of network nodes to forward each other's packets and thus these nodes also act as routers. In such a network resources are limited and also topology changes dynamically. So providing Quality of service(QoS) is also necessary. QoS is more important for real time applications for example Video Streaming. IEEE 802.11e network standard supports QoS through EDCA technique. This technique does not fulfill the requirements of QoS. So, in this project modified EDCA technique is proposed to enhance QoS for Video Streaming application. This technique is implemented in NS2 and compared with traditional EDCA.
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
Medium Access control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In this paper, a general model for MAC protocol to reduce the delay, maximize throughput and conserve the energy consumption in channel accessing in high density randomly distributed wireless sensor network is presented. The proposed model is simulated using MATLAB. The simulation results show that the average delay for sensors with sufficient memory is lower than sensors without
memory. Further, the throughput of the channel access method with memory is better than without memory.
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
Transmission control conventions have been utilized for data transmission process. TCP has been pre-possessed
for information transmission over wired correspondence having diverse transfer speeds and message delays over
the system. TCP gives correspondence utilizing 3-handshake which sends RTS and ACK originate from server
end and information message has been transmitted over the data transmission gave. This does not give security
over flooding assault happened on the system. TCP gives correspondence between distinctive hubs of the wired
correspondence however when multi-spilling happens in a system TCP does not gives legitimate throughput of
the framework which is significant issue that happened in the past framework. In the proposed work, to beat this
issue SCTP and Improved SCTP transmission control convention has been executed for the framework
execution of the framework. SCTP gives 4-handshake correspondence in the message transmit and improved
SCTP gives the performance when the queue length comes to its full value then it divides the message to other
nodes because of which security element get expansions and this likewise gives correspondence administrations
over multi-spilling and multi-homing. Numerous sender and recipients can impart over wired system utilizing
different methodologies of correspondence through same routers, which debases in the TCP convention. In last
we assess parameters for execution assessment. Here, we composed and actualized our proving ground utilizing
Network Simulator (NS-2.35) to test the execution of both Routing conventions.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
Similar to ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE MAC PROTOCOL (20)
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Telegram is a messaging platform that ushers in a new era of communication. Available for Android, Windows, Mac, and Linux, Telegram offers simplicity, privacy, synchronization across devices, speed, and powerful features. It allows users to create their own stickers with a user-friendly editor. With robust encryption, Telegram ensures message security and even offers self-destructing messages. The platform is open, with an API and source code accessible to everyone, making it a secure and social environment where groups can accommodate up to 200,000 members. Customize your messenger experience with Telegram's expressive features.
This tutorial presentation provides a step-by-step guide on how to use Facebook, the popular social media platform. In simple and easy-to-understand language, this presentation explains how to create a Facebook account, connect with friends and family, post updates, share photos and videos, join groups, and manage privacy settings. Whether you're new to Facebook or just need a refresher, this presentation will help you navigate the features and make the most of your Facebook experience.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Your LinkedIn Success Starts Here.......SocioCosmos
In order to make a lasting impression on your sector, SocioCosmos provides customized solutions to improve your LinkedIn profile.
https://www.sociocosmos.com/product-category/linkedin/
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Project Serenity is an innovative initiative aimed at transforming urban environments into sustainable, self-sufficient communities. By integrating green architecture, renewable energy, smart technology, sustainable transportation, and urban farming, Project Serenity seeks to minimize the ecological footprint of cities while enhancing residents' quality of life. Key components include energy-efficient buildings, IoT-enabled resource management, electric and autonomous transportation options, green spaces, and robust waste management systems. Emphasizing community engagement and social equity, Project Serenity aspires to serve as a global model for creating eco-friendly, livable urban spaces that harmonize modern conveniences with environmental stewardship.
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEFebless Hernane
Using Google Teams (G-Teams) is simple. Start by opening the Google Teams app on your phone or visiting the G-Teams website on your computer. Sign in with your Google account. To join a meeting, click on the link shared by the organizer or enter the meeting code in the "Join a Meeting" section. To start a meeting, click on "New Meeting" and share the link with others. You can use the chat feature to send messages and the video button to turn your camera on or off. G-Teams makes it easy to connect and collaborate with others!
This tutorial presentation offers a beginner-friendly guide to using THREADS, Instagram's messaging app. It covers the basics of account setup, privacy settings, and explores the core features such as close friends lists, photo and video sharing, creative tools, and status updates. With practical tips and instructions, this tutorial will empower you to use THREADS effectively and stay connected with your close friends on Instagram in a private and engaging way.
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyDigital Marketing Lab
Explore the latest trends in Search Engine Optimization (SEO) and discover how modern practices are transforming business visibility. This document delves into the shift from keyword optimization to user intent, highlighting key trends such as voice search optimization, artificial intelligence, mobile-first indexing, and the importance of E-A-T principles. Enhance your online presence with expert insights from Digital Marketing Lab, your partner in maximizing SEO performance.
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
ACHIEVING ENHANCED THROUGHPUT IN MOBILE ADHOC NETWORK USING COLLISION AWARE MAC PROTOCOL
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
DOI : 10.5121/ijasuc.2011.2102 7
ACHIEVING ENHANCED THROUGHPUT IN MOBILE
ADHOC NETWORK USING COLLISION AWARE MAC
PROTOCOL
M Abdul Gafur1
Niraj Upadhayaya2
Syed Abdul Sattar3
1
Dept. of Computer Science & Engineering, Jawaharlal Nehru Technological University,
Hyderabad, India
gafurm@rediffmail.com
2
Dept. of Computer Science & Engineering, JB Institute of Engineering & Technology,
Hyderabad, India
drnirajup@gmail.com
3
Dept. of Computer Science & Engineering, Royal Institute of Technology & Science,
Hyderabad, India
syed49in@yahoo.com
ABSTRACT
Since wireless medium is high demand resource the design of an efficient medium access protocol is
important for Mobile Adhoc Networks. As MAC is the base layer in the protocol stack a performance gain
in this layer will have significant improvement in the overall performance of the network. Since the current
IEEE 802.11 MAC standard is not adaptive to the network scenario its performance is poor in terms of
throughput, fairness and delay. Although several alternatives to the existing standard is proposed many of
them are not satisfactorily address the key issues of keeping the simplicity of the protocol and avoiding the
overhead on the nodes on duty in emergency situations where usually adhoc networks are applied. In this
paper we propose an adaptive, collision aware MAC protocol for wireless adhoc networks, termed the
Collision Based Contention (CBC) protocol, in which depends on the current collision level on the shared
medium contending nodes dynamically decides its Backoff value to avoid a blind random waiting before
access to the medium. The CBC scheme outperforms the BEB scheme employed in the IEEE 802.11 MAC
standard and other competing proposals.
KEYWORDS
Adhoc Networks, MAC, CBC, MILD, MIMD, AETF, Contention Window, Throughput, Fairness, Delay
1. INTRODUCTION
Mobile Ad hoc Network (MANET) is a kind of self coordinating wireless network of autonomous
mobile nodes. In such a network, each node plays the role of a host as well as a router, forwarding
packets for other nodes in the network, that may not be within the direct reach of wireless
transmission range of each other[5]. The unique features of MANETs grant them a high degree of
flexibility and survivability[6]. Therefore Adhoc network is ideally suited for potential crisis
management services applications in civil and military environments, such as responses to
hurricane, earthquake, tsunami, terrorism and battlefield conditions where the entire
communication infrastructure is destroyed and restoring communication quickly is crucial[23].
By using ad-hoc network, communication could be set up very fast and start rescue operation
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
8
immediately. As the large scale disasters very frequently happens in these days it is important to
have an efficient and durable disaster emergency communication systems like Mobile Adhoc
networks. In these networks, the medium access control (MAC) protocols that are used to share
common channel resources among wireless nodes are responsible for coordinating the access
from active nodes. Since MAC is running in the base layer in the TCP/IP protocol stack the
design of an efficient and high performance underlying MAC protocol is significant for the
overall performance of the adhoc network.
Aiming at the model of adhoc networks, IEEE802.11 developed a Wireless LAN(WLAN)
channel access protocol—Distributed Coordination Function (DCF)[8][9][11] by making an
expansion of the conventional carrier sense mechanism—CSMA/CA [6][7]. To deal with the
hidden terminal problem and exposed terminal problem, DCF can be implemented with Request
To Send/Clear To Send (RTS/CTS) [12][18] or using the technique mentioned in[13]. As per the
Distributed Coordination Function(DCF) scheme, a station first senses the medium to determine
whether any transmission is going on or not. If it finds the medium to be idle for more than DIFS,
station proceeds with its transmission. However, if the medium is found busy, transmission is
deferred till current ongoing transmission terminates. Then station selects random interval called
the backoff interval from an allowed range of values and use this value to initialize the backoff
timer. In the IEEE 802.11 DCF scheme, the CW is dynamically controlled by the Binary
Exponential Backoff (BEB)scheme[16][18][24]. In the BEB algorithm, the contention window is
doubled every time a node experiences a packet collision, i.e., when the CTS packet or the ACK
reply are not received before a timeout occurs. If a node is successful in its packet transmission,
the contention window is reset to the minimum value. In order to avoid the contention window
from growing too large or shrinking too small, two bounds on CW are defined: the maximum
contention window (CWmax) and the minimum contention window (CWmin).
.
Fig. 1 . Generic Backoff scheme
As the BEB scheme is too greedy to reset to the minimum value of the contention window
immediately after a success in transmission so that the node can access the shared medium again
very shortly, this scheme cannot prevent collisions in big extend. Besides, the BEB scheme lacks
the fairness in sharing the channel among the active nodes. Therefore some nodes can achieve
significantly larger throughput than others. The fairness problem occurs due to the fact that the
scheme resets the contention window of a successful sender to the minimum value after a single
success, while other nodes continue to maintain larger contention windows, thus reducing their
chances of seizing the channel and resulting in channel domination by the successful
nodes[4][10][21].
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
9
Although several alternatives to the existing standard is proposed many of them are not
satisfactorily address the key issues of keeping the simplicity of the protocol and avoiding the
overhead on the nodes on duty in emergency situations where usually adhoc networks are
applied. Besides as mentioned in [16][22] most of the proposals addresses one or two
features and neglect others.
The outline of the paper is as follows. Section 2 reviews some related works proposed by other
authors . In Section 3 we describe about Collision Based Contention (CBC) protocol to improve
the performance of the Adhoc networks. In Section 4 we simulate our proposed scheme and
compare its performance with existing IEEE802.11 Binary Exponential Backoff algorithm.
Section 5 concludes this paper.
2. A REVIEW ON RELATED WORKS
IEEE802.11 MAC protocol uses a simple method to deal with the contention in the wireless
medium. According to this each node doubles its contention window, CW, up to the maximum
contention window (CWmax) after a collision occurs and resets its CW to the minimum value
(CWmin) after a single successful transmission irrespective of the number of active nodes within
the range of that node or number of previous consecutive collision encountered by that node. This
can be represented as follows
CW = min(2:CW;CWmax) ; upon a collision
CW = CWmin ; upon a success
Where CWmax and CWmin is the maximum value, minimum value of CW respectively. CWmax
and CWmin are defined to avoid the contention window from growing too large and shrinking too
small. The values of the CWmin and CWmax are predetermined based on the expected range of
the number of active nodes and the traffic load of the network[18]. This scheme is known as
Binary Exponential Backoff (BEB). A node which has a low backoff value contends more
aggressively for the medium than a node which has a high backoff time, and has a higher
probability of accessing the medium. Backoff window size affects the throughput in IEEE 802.11
MAC protocol[4][14][15].The BEB algorithm essentially favours the last transmitter to
aggressively contend for the channel again since it has a low backoff the next time around and
thus leads to unfairness, particularly when the offered load is high and low throughput when
network size is large [10]. Besides this its sharp fall to the minimum CW immediately after a
single success causes for the high collision in the channel and hence poor throughput.
To address the fairness problem in the BEB scheme, the Multiplicative Increase and Linear
Decrease (MILD) algorithm was introduced in the MACAW scheme. In the MILD scheme, a
collided node increases its CW by multiplying it by 1.5. A successful node decreases its CW by
one unit, where a unit is defined as the transmission time of the RTS packet. The MACAW
protocol assumes that a successful node has a CW value that is related to the contention level of
the local area. The current CW is included in each transmitted packet and a contention window
copy mechanism is implemented at each overhearing node to copy the CW of the overheard
successful transmission into its local CW.
Besides increasing the header size of the RTS packets, the MILD scheme may also suffer from
the migration of the CW value into areas with different contention levels that do not match the
CW values When the number of active nodes changes sharply from high to low, MILD cannot
adjust its CW fast enough because of the linear decrease mechanism. For example, when we set
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
10
values 16 and 1024 for minimum and maximum value of contention window , it takes a
maximum of 1008 successful transmissions for MILD to reach CWmin. As a refined version of
MILD later Multiplicative Increase and Multiplicative Decrease (MIMD) scheme is proposed. In
MIMD whenever a packet transmitted from a node is involved in a collision, the contention
window size for the node is increased by backoff factor 2 and the contention window for the node
is decreased by factor 2 if the node transmits a packet successfully. The MIMD is really a special
case of Exponential Increase and Exponential Decrease Backoff Algorithm (EIED) in which
whenever a packet transmitted from a node is involved in a collision, the contention window size
for the node is increased by backoff factor rI and the contention window for the node is decreased
by factor rD if the node transmits a packet successfully[1]. Both MIMD and EIED have a main
drawback- CW becomes too large after some failures in the packet transmission, because of its
exponential increase irrespective of the window size. Similarly it will come down too fast to the
minimum level with some successful transmission, because of its exponential decrease. MIMD or
EIED is not following the conservative approach of MILD. Therefore throughput loss occurs
especially in heavy loaded network as number of collisions is high.
Almanaseer and Ould-khaoua[17] proposed a logarithmic backoff algorithm but they were
neglecting the negative effect of the algorithm on transmission delay and number of routing
packets as mentioned in [3].
Another remarkable proposal is Adaptive efficiency fairness tradeoffs (AETF ) backoff in which
with the help of two counters, ns (number of success) and nf (number of failure), and two
threshold values ns_Th ( threshold for number of consecutive success) and nf_Th ( threshold for
number of consecutive failure) tries to control the domination of some nodes over the shared
channel as well as the starvation of some without getting channel access for a long period of
time[11]. Backoff threshold is calculated with the following self regulated expression
It is needless to say that this expression and two counters make the algorithm too complex and
considerable overhead on the nodes which is quite unsuitable for a system like adhoc network
which is applied in mission critical areas and besides that usually MANET devices are battery
driven and over head on the device severely affect the battery life. Several other proposal are
appeared in recent years
3. COLLISION BASED CONTENTION PROTOCOL
According to our proposed Collision Based Contention Protocol unlike in the case of BEB and
other above mentioned schemes contention window of the sender nodes increase or decrease
adaptively in a non uniform rates taking in to account the current scenario of the shared medium
and collisions encountered by the nodes. Usually contention window size is incremented on a
collision on transmission. Similarly, contention window size is decremented on a success(absence
of collision). Therefore we have a legitimate conclusion that contention window can be used as
the implicit pointer that reflects the frequency of collision encountered by the nodes without
having additional counters unlike in the case of AETF. In this scheme we have one set of values
say I1, I2, I3 etc (Incrementing factors) and another set of values say D1, D2, D3
etc(Decrementing factors) by which we increment and decrement CW adaptively depends on the
number of previous consecutive collisions experienced by the nodes. We divide the collision to
the various level say 1, 2, 3 etc. Number of levels may vary depends on the size of the network.
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
11
As the size of the network increases number of levels also can be increased. When there is a
collision on the first level we considerably increment the CW. If there is again collisions in
higher layers we drop the factor for increment. Case is same on a success in transmission. Here
when there is a success in transmission on the first level we considerably decrement the CW. But
on a success in the higher levels we drop the factor for decrement. This can be summarized as
follows.
Upon a failure under collision level i:
CWnew = CWcurrent increment by Ii
CWcurrent = CWnew
( Where i = 1, 2, 3… and I1>I2>I3…)
Upon a Success under collision level i:
CWnew = CWcurrent decrement by Di
CWcurrent = CWnew
( Where i = 1, 2, 3… and D1>D2>D3…)
To understand the legitimacy of our proposed scheme it is important to understand the puzzled
relationships between the throughput, collision and backoff time. To increase the throughput we
have to reduce idle period. This can be done by reducing the backoff time. But reduction in
backoff time causes for the increase in collision because nodes would get a premature access to
the shared channel and result in collision with packets from other nodes[20]. This increase in the
collision will reduce the throughput!
This relationships keep us in puzzled state, because, to get higher throughput either we have to
decrease the CW size ( to reduce the backoff time) or we have to minimize the collisions. But if
we decrease the CW size to get higher throughput, it will increase the chance for more collisions
and in effect less throughput! Similarly if we try to minimize the collisions to get higher
throughput by keeping larger CW, it also result in low throughput since idle time increases.
Therefore we should try to decrease the CW size without creating much collisions in the network.
We effectively achieve this goal in CBC scheme.
Unlike BEB and other proposed schemes, in CBC on a a collision on initial stage (level 1) we
increment contention window by a larger factor(I1) because initially window size will be very
small. But if there is a again collisions in higher levels, we reduce the scale for increment since
already CW has become large because of the increment in previous levels by larger scale. In this
way we always get an optimum sized window to mitigate the chances for the future collisions.
Similarly when we have a success for transmission on the higher collision levels , instead of shoot
down to minimum CW, we slightly reduce the size of the window, because even if we have an
occasional success it does not mean that network load is light or number of active nodes is less.
So conservative approach is that we reduce the size of window in a small factor. When the
window size becomes smaller and smaller (it means number of successful transmission is large)
we increment the factor for reduction of CW to avoid unnecessary delay in transmission due to
large sized contention window.
In the CBC scheme CW size does not go down to the minimum value after a single success. So
successful node and other node will have almost equal chance for seizing the channel. Therefore
this algorithm alleviate fairness issue among the nodes. At the same time since it is not
decremented linearly it will not have to wait for several successful transmission to reach at the
minimum CW as in the MILD. Therefore if we have a sufficient number of success, then we can
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
12
come to the minimum CW and thereby avoid unwanted delay and channel idle period. In the case
of MIMD, CW increment and decrement exponentially irrespective of the current network load.
This will result in a too large and too small CW after a minimum number of success and failure in
transmission respectively. In this case most of the time CW size will be more than enough or less
than enough. In most of the cases this algorithm will not justify the behaviour of actual computer
networks. Since CBC scheme infer the collision rate and network load from the current CW and
number of consecutive success and failure from the collision levels (which is represented in terms
of CW) there is no need of separate counters and complex calculation of backoff threshold unlike
in the case of AETF.
3.1 Selection of parameters used in algorithm
Because of the peculiarity of our scheme (high increment on initial collision level) we can
initially set a very small value for CWmin. Since adhoc networks is usually applied in the rescue
operations and other emergency situations as mentioned in the first section, nodes in adhoc
networks are becoming active in large volume simultaneously rather than consecutively.
Therefore we have made a reasonable assumption that if there is a collision initially in the
network there is a high chance for subsequent collisions due to more number of active nodes.
From this assumption we made relatively high value for initial increment and later reduce factor
for increment.(even if there is no bulk number of active nodes in the network against the
assumption we made, it wont create any problem in our algorithm, because we decrement CW in
big scale to compensate initial larger increment). Same logic is applied for decrementing CW
when a success in transmission comes. Taking into account the major network parameters like
throughput, fairness, delay and collisions and depends on total number of collision levels
selection of Ii has been made reasonably. For example for a network with three collision levels
selection of incrementing factors have been made in a way that in which increment by I1 is done
until one eighth of the CWmax, Increment by I2 is done until one half of the CWmax and
increment by I3 is done until CW max. Similarly selection of Di has been made in a way in
which decrement by D1 bring down the contention window to CWmin and decrement by D2
bring down to one eighth of the CWmax and decrement by D3 bring down to half of the CWmax
.
4. PERFORMANCE EVALUATION AND RESULTS
4.1 Simulation Environment
We have used network simulator ns-2.33 for evaluating the performance of our proposed backoff
algorithm. ns-2 is a powerful network simulator. ns-2 is extensively used by the networking
research community. It provides substantial support for simulation of TCP, routing, multicast
protocols over wired and wireless (local and satellite) networks, etc[25][26]. The simulator suite
also includes a graphical visualiser called network animator (nam) to assist the users get more
insights about their simulation by visualising packet trace data. We have used AWK, a text
processing utility to extract desired information from ns trace file and XGRAPH to plot the
graphs. We have used Linux Operating System to run our simulation code. We have considered
the different networking scenario with varying number of nodes to evaluate the performance.
Each pair of node consists of a transmitter and a receiver. We have taken DIFS = 50µs, SIFS =
10µs and slot time = 20µs. Packet interval is five milliseconds. The performance is evaluated by
adding new nodes in the network as time varies or expedited arrival of several nodes
simultaneously. Sufficient time is given for running the simulation in order to get chances for
every node to participate in the network activity of transmission or reception.
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
13
Table 1Simulation Parameters
Parameter
Phy
Packet size
Queue length
SIFS
DIFS
ProType
Antenna type
CWmin
CWmax
Simulation time
Number of nodes
Value
wireless
1500
500
10µs
50µs
Free Space
Omni directional
15 or 31
1023
30 s
50 or 100
4.2 Throughput
We have calculated overall throughput in the network. For this purpose we have counted the received
packet at every node at every second. We have performed a comparison of throughput getting from our
algorithm with standard binary exponential backoff algorithm(BEB) in the heavily loaded network with
100 nodes and lightly loaded network with merely 50 nodes as shown in the Figure 2 to Figure 5. We
have tested performance with two different values for CWmin (ie 15 and 31). From the Figure 2 to
Figure 5 it is very clear that our algorithm performs better than the binary exponential backoff algorithm
in each case.
To calculate the throughput we have taken the total number of received packets in the network. This
information will be available in the agent trace file. Multiplying this number with packet size we get the
total number of bits received. To get the overall throughput we divide this value with the time duration
upto which we were sending the packet
where Npr is the total number of packets received in each second, S is the packet size and T
is the total time in second upto which we have sent the packets
Figure 2 Throughput Comparison of BEB and CBC with 50 nodes and CWmin=15
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
14
Figure 3 Throughput Comparison of BEB and CBC with 50 nodes and CWmin=31
Figure 4 Throughput Comparison of BEB and CBC with 100 nodes and CWmin=15
Figure 5 Throughput Comparison of BEB and CBC with 100 nodes and CWmin=31
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
15
4.3 Collision
Besides the throughput we have calculated the number of packet collisions in the network. Unlike
IEE802.11 BEB scheme we have designed our scheme to reduce the contention window size
without a compromise on collision. We have no greed to reset the CW to the minimum value
immediately after a success on transmission irrespective of the the node’s previous collision
history. Instead decision on reducing factor is taken based on the node’s previously experienced
collisions. If a node is within the high collision domain reduction factor is less and reduction
factor is more within a low collision domain. In addition to this, a larger increment on CW on a
collision at the initial stage helps to reduce the probability for the subsequent collisions on the
same node. Even though the direct benefit of our scheme is the reduction in the collision ( hence
increase in the throughput) indirectly it provides the better fairness among the contending nodes
in the channel. Following graph is the comparison of collision in CBC and BEB scheme.
Figure 6 Comparison of Collision in BEB and CBC
4.4 Delay
Besides the throughput and collision we have calculated the delay in the network when we apply
CBC and BEB . Figure 7 shows the delay experienced by different packets in a network with
CBC and BEB in MAC layer. The graph shows that CBC brings down the packet delay
considerably in the network. Unlike in the case of [3] our algorithm performs well in lightly
loaded network as well as heavily loaded network. Taking the average of the delay for every
packet transmitted we get the average delay in the network. Average packet delay is defined as
the time duration from the time the packet is at the head of the MAC queue ready to be
transmitted until the packet delivery is confirmed by an ACK[19]
Delay for one packet = Tps −Tpr , where Tps is the sending time of a packet and Tpr is the
receiving time of that packet.
where N is the total number of packets
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
16
Figure 7 Comparison of Delay in BEB and CBC
5. CONCLUSION
In this paper, we proposed a new MAC scheme for mobile adhoc network called Collision
Based Contention Protocol (CBC). We have analyzed the BEB and some other new proposals in
this paper. We have pointed out the major drawbacks of the different alternatives to BEB which
made them unsuitable for Adhoc network. Performance of CBC scheme is evaluated using the ns-
2.33 network simulator. The simulation results show that CBC outperforms the BEB . Our
proposed method present an approach, in which depends on the current collision level on the
shared medium contending nodes dynamically decides its Backoff value to avoid a blind random
waiting before access to the medium. CBC scheme prevent CW from growing too large on
collision and from shrinking too small on a success in transmission, hence prevent unnecessary
delay for transmission and throughput degradation. Besides, unlike in the case of BEB, here
CW size does not become the minimum value after a single success. So successful node and
the other nodes will have almost equal chance for seizing the channel. Therefore this
algorithm reduces the fairness issue. At the same time it does not have the “more than
enough and less than enough” problem of MIMD
REFERENCES
[1] Bianchi G ,(2000) Performance analysis of the IEEE802.11 Distributed Coordination Function. IEEE
Journal on Selected Areas in Communications, pages 533—547.
[2] B.N. Xu, Hischke. S, Walke. B, (2003). The role of ad hoc networking in future wireless
communications, IEEE International Conference on Communication Technology, pages. 1353 – 1358
[3] B Y Muneer etal., (2010) Enhanced Fibnacci Backoff Algorithm for Mobile Ad-hoc Network In the
proc.of 1oth of International Conference on Computer and Information Technology computing, pages
749-754.
[4] Der-Jium, Han-Chieh Chao, Hsiao-Hwa Chen, (2010). Slow Start Backoff Algorithm for Ad-Hoc
Wireless Networks. IEEE Global Telecommunications Conference, page 1-5.
[5] D. Sivaganesan R Venkatesan, (2010). Performance Analysis of Broadcasting In Mobile Adhoc
Networks Using Cluster Approach. International Journal of Adhoc, Sensor & Ubiquitous Computing,
IJASUC.
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
17
[6] D Zhang, B Zhang, D Lu, (2008). Contention Window Based Fairness Backoff Algorithm In Ad Hoc
Networks. IEEE Int. Conference Neural Networks & Signal Processing, Zhenjiang, China, pages 8-10.
[7] Elarbaoui, I, Refai, H.H, (2008). Enhancement of IEEE 802.11 DCF backoff Algorithm under heavy
traffic. IEEE/ACS International Conference on Computer System and Applications, page 1082.
[8] Fang Hong-Yu, Xu-Lei, Li Xiao-hui, (2010). Logarithmic Backoff Algorithm of MAC Protocol in
Adhoc Networks. International Conference on E-Business and E-Government,pages 1695-1698.
[9] Hastad J, Leighton T, and Regoff B, (1996). Analysis of backoff protocol for multiple access
channels. SIAM Journal on Computing, pages 740—774.
[10] Jae H K, Ajith W, Injong R, (2008). Experimental Evaluation of MAC Protocols for Fairness and
QOS Support in Wireless Networks. In the proc. of International Conference on Networking Protocols,
pages 298—307.
[11] Jae R C, Jae H K, Seok W K, (2010). A Noval Estimation-Based Backoff Algorithm in the IEEE
802.11Based Wireless Network. In in the proc. of IEEE Conference on Consumer Communications and
Networking, pages 1—5.
[12] Kurose J F and Ross K W, (2003). Computer Networking. A Top-Down Approach Featuring the
Internet. Pearson Education.Inc., Sixth edition.
[13] Li Bin Jiang Soung Chang Liew, (2008). Improving Throughput and Fairness by Reducing Exposed
and Hidden Nodes in 802.11 Networks. IEEE Transaction on Mobile Computing. Pages 34-49
[14] Lee P K Wong, Yin D J, (2010). Throuhput Analysis of CSMA Protocol with Exponential backoff.
In in the proc. of Conference on Wireless and Optical Communications, pages 1—5.
[15] Natkaniec M and Pach A R, (2000). An analysis of the backoff mechanism used in IEEE802.11
Networks. In the proc.of fifth IEEE Symposium on Computers and Communications,France. pages 444—
449.
[16] P Venkata Krishna, Sudip Misra, Mohamad S Obaidath,( 2010). Virtual Backoff Algorithm: An
Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks. IEEE
Transaction on Vehicular Technology, pages 1068-1075.
[17] S Manseer M Ould-khaoua L Mackenzie,( 2009) On the Logarithmic Backoff Algorithm for
MAC Protocol in MANETs. The 4th
International Conference on Computer Science and
InformationTechnology, Jordan.
[18] Shenker S etal.,(1994) MACAW:a media access protocol for wireless lan. In the proc.of conference
on Communications, architectures, protocols and applications, pages 212—225.
[19] Subobh Pudasani etal., (2010). Deterministic Cross Collision Exclusion in Backoff based Collision
Resolution Process. 6th
International Conference on Networked Computing, pages 1-6.
[20] Wang CG, Li B, Li LM, (2004). A new collision resolution mechanism to enhance the performance
of IEEE802.11DCF. IEEE Transactions on Vehicular Technology,pages.1235-1246
[21] Wehbi, Bachar, Laouiti Anis, Cavalli Ana, (2010 ). Transmit And Reserve(TAR) a Coordinated
Channel Access for IEEE 802.11 Networks. Wireless Communications and
Networking Conference, pages 1-6.
12. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
18
[22] Wei G, Cui H X, (2009). A novel backoff algorithm based on the tradeoff of efficiency and
fairness for ad hoc networks. In the proc. of International Conference on Communications and Mobile
computing, pages 212—225.
[23] Yassein M B etal, (2010). A New Probabalistic Linear Exponential Backoff Scheme for
MANETs.IEEE International Symposium on Parallel & Distributed Processing pages 1-6.
[24] http://en.wikipedia.org/wiki/802.11.
[25] http://isi.edu/nsnam.
[26] http://mailman.isi.edu/pipermil/ns-users/.
[27] http://standards.ieee.org/getieee802/802.11html.