This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
Abstract: Wireless sensor network (WSN) is used to collect and send various kinds of messages to a base station (BS). Wireless sensor nodes are deployed randomly and densely in a target region, especially where the physical environment is very harsh that the macro-sensor counterparts cannot be deployed. Low Energy Adaptive Clustering Hierarchical (LEACH) Routing protocol builds a process where it reduces the Packet Loss Rate from 100 % to 55% .Simulations are carried out using NS2 simulator.
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
In the seven-layer OSI model of computer networking, media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium, e.g. an Ethernet network. The hardware that implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point network. This channel may provide unicast, multicast or broadcast communication service.
En el presente se encuentra una recopilación de temas de revistas educativas las cuales tienen vinculación con el tema de investigación que me encuentro desarrollando para mi TEG en la Maestría de Tecnología Educativa el cual tiene como objeto de estudio: Proponer un entorno virtual colaborativo para la enseñanza de la asignatura Tradición, Cultura y Folclor Local, mediada por las tecnologías audiovisuales de la Web 2.0 en la Unefa-Núcleo Caracas.
A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wirele...csandit
Due to tremendous growth of the wireless based application services are increasing the demand
for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization
in multi-radio wireless mesh networks is a very challenging problem. WMNs have
been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX
(802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high
collision due to improper channel slot usage approximation error. To overcome this here the
author propose the cross layer optimization technique by designing a device classification
based channel slot re-utilization routing strategy which considers the channel slot and node
information from various layers and use some of these parameters to approximate the risk
involve in channel slot re-utilization in order to improve the QoS of the network. The simulation
and analytical results show the effectiveness of our proposed approach in term of channel slot
re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELE...cscpconf
Due to tremendous growth of the wireless based application services are increasing the demand for wireless communication techniques that use bandwidth more effectively. Channel slot reutilization in multi-radio wireless mesh networks is a very challenging problem. WMNs have been adopted as back haul to connect various networks such as Wi-Fi (802.11), WI-MAX (802.16e) etc. to the internet. The slot re-utilization technique proposed so far suffer due to high collision due to improper channel slot usage approximation error. To overcome this here the author propose the cross layer optimization technique by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of these parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of our proposed approach in term of channel slot re-utilization efficiency and thus helps in reducing latency for data transmission and reduce
channel slot collision.
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
Routing is the major research issues in the Wireless Mesh Network (WMN). Ad-hoc networks routing protocols can be applied for WMN, but due to limited success & less efficiency there is need of more efficient routing protocols. In Infrastructure Wireless Mesh Routing Architecture (IWMRA) routing protocol, source node initiates a path establishing process whenever path breaks. This is not an ideal method in WMN where every nodes rather than source and destination in the path are motionless. One way of overcoming this is by initiating the local route repair by destination node. In this paper, we propose an active path updating procedure APULAR for quickly repair the broken path. Moreover, to improve throughput and to reduce the co-channel interference, we use multiple interface with multi channels. We are considering 4-hop as an interference range and will use fixed channel assignment within the mesh routers to reduce the inter flow interference. Our procedure is simulated in NS2 and compared with AODV – MI3 and APULAR-MI2, APULAR-MI3, APULAR-MI5. Simulation results show that our protocol performs better AODV in key performance metrics like packet delivery ratio, control overhead, average throughput and end-to-end delay.
Implementation of Mobility and QoS Aware Energy Efficient Anycast Routing in ...Eswar Publications
Mobile ad hoc network (MANET) is a self-configuring network. It is wireless as well as infrastructure-less networks. It requires limited energy and resources. In MANET, data travel through the host. Each mediator host acts as a router. Therefore, It is difficult to guess the future location or network topology of the host. Anycast routing is nothing but one to one of many associations. In anycast routing, multiple destinations share the same IP address. From multiple destinations, packet routed to the nearest destination. Anycast is the simplest way of
communication. It has minimum communication overhead because packet forwarded to the nearest destination.
Therefore, it saves power, network bandwidth and message collision during message transmission. Due to host movement and dynamic changes in network topology stability and QoS of nodes is an important issue in MANET. These issues are addressed by Mobility and QoS aware energy efficient routing protocol. Proposed protocol has three major models: (1) Consistency model to identify stable nodes in network, (2) Traffic model to take QoS into consideration by checking traffic in network and (3) Energy model to make sure the link duration is within an acceptable range. Therefore, high data delivery can be achieved and nodes energy will be taken into the
consideration and reduce the link failure due to energy loss. PDR of EMQAR protocol is higher than existing MQAR protocol by 9%. Energy cosumption of EMQAR protocol is less than MQAR protocol by 2%. Dealy of EMQAR protocol is reduced by 1% than MQAR protocol. Control overhead of EMQAR protocol is 10% lesser than MQAR protocol.
ADAPTATION TO NON-CRITICAL FAILURE AND PERFORMANCE ANALYSIS OF OPTICAL WDM NE...ASHIT CHANDER
The main area of concern for the WDM network is to find the best feasible and reliable path .In case fault occurs in a network, the network needs to be prepared for such situations by providing a fault tolerant network in case of a failure occurring between the source-destination node and assignment of different matrices such as wavelength, feasible path and availability of resources for data transmission in the network. Based on the Qos parameters evaluation the best and most reliable path in case of fault occurrence is selected
These slides explain the Protocol Framework for 5G mmWave Backhaul Network, as a part of a project presentation for the course Telecom Architecture at Northeastern University.
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
IEEE802.11e standard provides an EDCA mechanism to ensure the QoS using service differentiation function for IMM traffics through the WCN. In an EDCA mechanism, IMM traffics have been classified into four categories and each category has specific priority. Many EDCA schedulers allow these traffics to access the channel based on assigned priorities. The IMM high priority traffic is high delay sensitive and required high bandwidth to ensure QoS over the networks. Scheduling mechanism is the effective way to satisfy IMM traffic but it cannot give guarantee because of the randomness of some EDCA schedulers or proposed networks. In order to provide the QoS, scheduling mechanism is the challenging issue to transmit IMM traffic through the channel and it is still need to be solved over WCN. This work aims to examine the effect of the randomness on different MAC layer schedulers' performance and evaluates the performance of the proposed schedulers using different performance metrics in WCN.
In this paper, we examine WiMAX – based network and evaluate the performance for quality of service (QoS) using an idea of IEEE 802.16 technology. In our models, the study used a multiprocessor architecture organized by the interconnection network. OPNET Modeler is used to simulate the architecture and to calculate the performance criteria (i.e. throughput, delay and data dropped) that
slightly concerned in network estimation. It is concluded that our models shorten the time quite a bit for
obtaining the performance measures of an end-to-end delay as well as throughput can be used as an
effective tool for this purpose.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Networks
1. B.Tech (IT) Minor Project Presentation,2014
Performance analysis of CSMA/CA and TDMA MAC
protocols in Wireless Mesh Networks
SAGAR GUPTA(BT/IT/1154)
PRANJAL DAS(BT/IT/1146)
DHRUBA JYOTI SAIKIA(BT/IT/1114)
DARIHUNLANG SUCHIANG(BT/IT/1205(L))
Under the supervision of
Md. Iftekhar Hussain
Department Of Information Technology
North-Eastern Hill University
SHILLONG-22
2. CONTENTS
WIRELESS MESH NETWORKS
• WMN vs MANET
• WMN Architecture
• WMN Characteristics
• Application Scenarios
MAC PROTOCOLS FOR WMN
• Background
• CSMA/CA
• TDMA
Performance Evaluation of CSMA/CA and TDMA in WMN
• Performance Metric
• Experimental Setup
• Experimental Results
Conclusion And Future works
References
3. WIRELESS MESH NETWORKS
• WMNs offer multiple redundant communications paths
throughout the network. Whenever a link fails, the network
automatically routes messages through alternate paths.
• Even in adverse conditions devices in WMNs co-operate with
each other in transmitting packets through the network.
• WMNs are believed to be self-configuring and self-healing
networks.
• Dramatic increase in link quality just by shortening the
distance between the nodes
4.
5. Types of Nodes in WMN
Wireless Mesh Router
• contains additional routing functions to support mesh networking.
• usually equipped with multiple wireless interfaces built on either the same
or different wireless access technologies.
• improves the flexibility of mesh networking.
Mesh Clients
• can also work as routers since they also have necessary functions for mesh
networking.
• gateway and bridge functions do not exist in these nodes.
• usually have only one wireless interface as in Laptop/desktop PC, pocket
PC etc.
6. WMN vs MANET
There are various factors which can differentiate wireless mesh network from
Ad-hoc Network. The major differences between these two types of network
are the network topology and mobility of node
• Network topology: Ad- hoc network are called as the infrastructure less
network with a highly dynamic topology where as WMN have a relatively
static network topology
• Mobility of relay nodes: In Ad-hoc network the relay nodes have a higher
degree of mobility i.e. relay nodes aren't fixed whereas in WMN's the
degree of mobility of relay node is much lower than in Ad-hoc networks.
• Infrastructure requirement: Ad-hoc network is infrastructure less whereas
WMN has partial or fully fixed infrastructure.
• Energy constraints: In Ad-hoc network energy constraints is high whereas
it is low in the WMNs.
7. WMN Architecture
• Based on the functionality of the nodes the
architecture of WMNs can be classified into:
• Infrastructure mesh Architecture
• Client mesh Architecture
• Hybrid mesh architecture
8. Infrastructure Mesh
In infrastructure mesh architecture, the mesh routers
collectively provide a wireless backbone infrastructure.
Client node is passive in mesh infrastructure.
9. Client Mesh [1]
Client meshing provides peer-to-peer networks among
client devices. Here no such mesh router is required. Client will
act like a mesh router by relaying the packets.
10. Hybrid Mesh
• Mesh router provide the backbone of such network.
• With the help of network functionalities such as routing and
forwarding of data packets, clients can actively participate in
the creation of the mesh.
11. WMN Characteristics
• Dynamic self-configuration and self-organization
• Adaptation
• Fault tolerance and robustness
• Low-Cost
• Integration and interoperability
12. Application Scenarios
• Broadband Home Networking
• Community and neighborhood networking
• Enterprise Networking
• Building automation
• Security Surveillance systems
13. Mac Protocols for WMN
• Objectives
o Maximize channel utilization.
o Minimize channel access delay.
• CSMA/CA : [4],[6],[8]
o It is a Random Access Protocol.
o It continuously senses the channel.
o Collision avoidance technique –
- Request to send/clear to send(RTS/CTS)
- Transmission
14. Working of CSMA/CA
CSMA/CA was invented for Wireless Networks . In Wireless
Networks collisions are need to be avoided because they cannot
be detected. Collisions are avoided by three strategies:
• The Interframe space
• The Contention Window
• Acknowledgements
16. MAC protocols in WMN(cntd.)
TDMA: [3],[4],[7],[10]
• It is a channelization protocol.
• Each channel is allocated with a unique time slot.
• Three kinds of time slots-o
Control slots
o Contention slots
o Data slots
18. Working of TDMA
• In TDMA, a single channel can support multiple transmission,
if each transmission is divided into relatively short fragments
then are assigned a time slot to be transmitted .
21. Experimental Setup
• Performance of the assumed network topology has been
evaluated in terms of simulation in NS-2[5].
• The experiments were conducted to analyze the performance
of the CSMA/CA and TDMA MAC protocol.
• Table 1 specifies the various parameters considered along with
their values during the simulation.
22. Table 1: Simulation
Parameters
Parameter Name Values
• Traffic Types
• Packet Size
• Routing Protocol
• Radio Propagation Model
• Bandwidth
• Antenna Type
• Distance per hop
• No. of Nodes
• Simulation Time
• CBR and FTP
• 1000 bytes
• AODV
• Two Ray Ground Reflection
Model
• 11 Mbps
• Omni Antenna
• 20 Km
• 11
• 50 Secs
34. Conclusion and Future works
• In this Project we have studied and analysed the performance
of CSMA/CA and TDMA MAC protocols in Wireless Mesh
Network.
• CSMA/CA is having different problems like hidden node,
exposed node, information asymmetry.
• TDMA provide good solutions to traffic correlation, heavy
collision.
• Comparingly in our performance analysis, we found that the
performance of TDMA is far better than that of CSMA/CA.
• Since CSMA/CA performance is not good using omni-directional
antenna. So, in future we can work on these two
protocols using directional antenna.
35. REFERENCES
[1] Akyildiz, Ian F., XudongWang, and WeilinWang. "Wireless mesh networks: a survey." Computer networks
47.4 (2005): 445-487.
[2] Ian F. Akyildiz and Xudong Wang ,”Wireless Mesh Networks”:JohnWiley and Sons ,Ltd Publication
[3] Mihail L. Sichitiu,”Wireless Mesh Networks: Opportunities and Challenges”
[4] IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,
Nov. 1997,P802.11.
[5] “Network Simulator- ns2.” http://www.isi.edu/nsnam/ns.
[6] Manshaei, H., et al. "Performance analysis of the IEEE 802.11 MAC and physical layer protocol." World of
Wireless Mobile and Multimedia Networks, 2005. WoWMoM 2005. Sixth IEEE International Symposium on a.
IEEE, 2005.
[7] Akyildiz, Ian F., et al. "Medium access control protocols for multimedia traffic in wireless
networks." Network, IEEE 13.4 (1999): 39-47.
[8] Bianchi, Giuseppe, Luigi Fratta, and Matteo Oliveri. "Performance evaluation and enhancement of the
CSMA/CA MAC protocol for 802.11 wireless LANs."Personal, Indoor and Mobile Radio Communications,
1996. PIMRC'96., Seventh IEEE International Symposium on. Vol. 2. IEEE, 1996.
[9] Perkins, Charles E. Ad hoc networking. Addison-Wesley Professional, 2008.
[10] Sen, Sayandeep, and Bhaskaran Raman. "Long distance wireless mesh network planning: problem
formulation and solution." Proceedings of the 16th international conference on World Wide Web. ACM, 2007.