Reliable on-demand multicast routing with congestion control in wireless ad hoc networks

Size: px
Start display at page:

Download "Reliable on-demand multicast routing with congestion control in wireless ad hoc networks"

Transcription

1 Reliable on-demand multicast routing with congestion control in wireless ad hoc networks KenTang,MarioGerla Computer Science Department University of California, Los Angeles Los Angeles, CA ABSTRACT In this paper, we address the congestion control multicast routing problem in wireless ad hoc networks through the medium access control (MAC) layer. We first introduce the Broadcast Medium Window (BMW) MAC protocol, which provides reliable delivery to broadcast packets at the MAC layer. We then extend the wireless On-Demand Multicast Routing Protocol (ODMRP) to facilitate congestion control in ad hoc networks using BMW. Through simulation, we show that ODMRP with congestion control adapts well to multicast sources that are aggressive in data transmissions. Keywords: multicast, on-demand routing, congestion control, ad hoc network, broadcast medium window 1. INTRODUCTION Multicast routing in wireless ad hoc networks has gain considerable interest in recent years. The main benefit of multicasting is the significant reduction of network load gained when packets need to be transmitted to a group of nodes. Congestion control (at the network level) is vital in multicast since the most important form of congestion control in the Internet, TCP, is not practical in multicast due to ACK implosion. Moreover, overload control is essential in wireless networks where scarce bandwidth is the norm. Some multicast routing protocols include AMRoute 4, AMRIS 26, CAMP 8, multicast AODV 23, and the On-Demand Multicast Routing Protocol (ODMRP) 16, 17, 18. ODMRP disseminates multicast packets on a mesh instead of the traditional multicast tree. By using a mesh, ODMRP introduces redundancy to combat packet loss in ad hoc networks where channel noise, collisions and mobility are common. Under low traffic load, ODMRP performs well. However, as traffic load increases, ODMRP progressively suffers from network congestion. This deprivation is not limited to ODMRP but is prevalent among other multicast protocols as well. In this paper, we introduce a novel MAC protocol, Broadcast Medium Window, (BMW) which supports reliable MAC broadcast in ad hoc networks. Furthermore, by exploiting BMW, we propose congestion control in ODMRP to reduce network load when contention is high. Our method is not confined to ODMRP alone; it can also be implemented on other multicast protocols, such as multicast AODV. We first describe our BMW protocol in section 2. Section 3 explains our congestion control scheme in ODMRP. Simulation results are given in section 4. Finally, section 5 concludes the paper. 2. BROADCAST MEDIUM WINDOW (BMW) The fundamental idea behind BMW 25 is to reliably transmit each packet to each neighbor in a round robin fashion. However, since BMW exploits many of the same concepts of IEEE , a brief operational overview of is in order. IEEE utilizes a collision avoidance scheme along with RTS/CTS/ACK control frames to transmit unicast packets. In , the Distributed Coordination Function (DCF) represents the basic access method that mobile nodes utilize to share the wireless channel. The scheme incorporates CSMA with Collision Avoidance (CSMA/CA) and acknowledgement (ACK). Optionally, the mobile nodes can make use of the virtual carrier sense mechanism that

2 employs RTS/CTS exchange for channel reservation and fragmentation of packets in situations where the wireless channel experiences high bit error rate. CSMA/CA works as follows. A node wishing to transmit senses the channel. If the channel is free for a time equal to the DCF InterFrame Space (DIFS) interval, the node transmits. If the channel is busy, the node enters a state of collision avoidance and backs off from transmitting for a specified interval. In the collision avoidance state, the node sensing the channel busy will suspend its backoff timer, only resuming the backoff countdown when the channel is again sensed free for a DIFS period. A typical sequence of exchanges in using the virtual carrier sensing mechanism involves the source node first sensing the channel using CSMA/CA. After CSMA/CA is executed, the source node transmits RTS, followed by the destination node responding with CTS, then with the source node sending the data frame and finally with the destination node confirming with an ACK to the source node. Any nodes receiving RTS, CTS or data frame that is not an intended destination will yield long enough for the source and destination nodes to complete the data exchange. For broadcast packets, IEEE nodes simply execute collision avoidance and then transmit the data frame Data structures In BMW, each node is required to maintain three lists: a neighbor list (NEIGHBOR LIST), a list of transmitted frames (SEND BUFFER) and a list of received sequence numbers (RECEIVER BUFFER). All nodes keep track of their neighbors through reception of frames (RTS/CTS/DATA/ACK/HELLO). Upon receiving any type of frames, a node updates its NEIGHBOR LIST. Furthermore, the NEIGHBOR LIST is purged if a neighboring node in the NEIGHBOR LIST has not been heard from for a specified amount of time. Each node also maintains a SEND BUFFER. The SEND BUFFER holds copies of the frames that were already transmitted but might be needed later for retransmission. A copy is removed from the SEND BUFFER after all neighbors have received it. The size of the SEND BUFFER should be at least as large as the maximum number of neighbors for any given node. Besides the SEND BUFFER, there is also a queue that stores packets that have not yet been transmitted. Finally, each node also maintains RECEIVER BUFFER. When a node receives a new frame, it records the frame s sequence number in RECEIVER BUFFER. When a source node transmits RTS to a destination node specifying a range of (from and to) sequence numbers, the destination node examines its RECEIVER BUFFER to determine whether it is missing any previous sequence numbers in the specified range. If so, the destination node replies with the missing sequence number in the CTS response Round robin approach In BMW, when a node has a packet to transmit, it first senses the channel and goes through a collision avoidance (CSMA/CA) phase similar to that of Upon the completion of the collision avoidance phase when the channel becomes free, the node sends RTS to one of its neighbors, specifying what sequence numbers have already been sent and what the current sequence number is. This is accomplished by extracting the lowest sequence number from the SEND BUFFER and specifying it into the RTS frame along with the current sequence number expected by the source node. Upon receiving the RTS, the intended neighbor examines its RECEIVER BUFFER and determines what sequence number it needs. If the node is missing a frame of a previous sequence number, the CTS response frame will reflect that. Likewise, if only the current sequence number is needed, the CTS response frame will reflect that as well. All other neighbors hearing the RTS will yield long enough for the CTS/DATA/ACK transmission. After the reception of the CTS, the source node then transmits the DATA (packet) that corresponds to the sequence number specified in the CTS frame. All other nodes hearing the CTS frame will yield long enough for the DATA/ACK transmission. Upon receiving the DATA, the destination node updates its RECEIVER BUFFER and replies with an ACK. All other neighboring nodes that received the DATA will also update their RECEIVER BUFFER. Upon receiving the ACK, if the DATA sent was not a current DATA but was instead obtained from the buffer, the source node continues its dialogue with the destination node with another RTS until the current DATA is sent from the queue. Here, the collision avoidance phase is skipped. Once the current DATA is transmitted and acknowledged, the source node then buffers the packet and chooses the next neighbor in its NEIGHBOR LIST and repeats the whole process over again. The round robin process runs smoothly when there are always packets to send. However, when there are no packets left in the transmit queue, the round robin process will halt and the source will not know whether the next neighbor in the NEIGHBOR LIST received all the broadcast DATA correctly until there is a new packet to send. To prevent this, BMW sets a timer for transmitting to the next node in the NEIGHBOR LIST. If the queue is empty for the time equal to this timer, the next node in the NEIGHBOR LIST will be chosen and the round robin process continues. If all the neighbors are visited in the round robin process and the queue is still empty, the round robin process stops until there is a new packet to transmit.

3 To detect neighbors, BMW relies on either transmitting HELLO frames periodically or listening in on existing MAC frames (RTS/CTS/DATA/ACK). To reduce HELLO frame overhead, a node that has just transmitted a frame will not send a HELLO frame for that given time period. In the event that nodes have absolutely no knowledge of any of their neighbors, transmissions by nodes are done by unreliable broadcasting (strict CSMA/CA) of the packets until the neighbors are detected Example We illustrate the concept of BMW through an example. Let us assume that node 5 wants to transmit a broadcast packet in Figure 1. Node 5 first determines a neighbor, say node 1, and sends RTS with sequence numbers ranging from 0 to 0 since no DATA frames have yet been sent. Node 1, upon receiving the RTS frame, replies with sequence number 0 in the CTS frame. Nodes 2, 3, and 4, upon receiving the RTS frame, yield long enough for the CTS/DATA/ACK exchange between node 5 and 1. After receiving the CTS frame, node 5 transmits DATA with sequence number 0. Node 1, upon receiving DATA, updates its RECEIVER BUFFER and replies with an ACK. For illustration purposes, let s say node 2 did not receive the DATA (possibly due to interference from neighboring nodes) while node 3 and 4 received the DATA correctly. Thus, node 3 and 4 also update their RECEIVER BUFFER. Upon receiving the ACK, node 5 stores the DATA that was sent into the SEND BUFFER and then selects node 2 as its next neighbor to transmit to. After executing the collision avoidance phase, node 5 sends RTS with sequence number range 0 to 1. Upon receiving the RTS, node 2 examines its RECEIVER BUFFER and noticed that frame 0 has not yet been received. Node 2 then sends CTS requesting sequence number 0. Node 5, upon receiving the CTS, obtains the DATA with sequence number 0 from the buffer and transmits the DATA. Upon receiving the DATA, node 2 updates its RECEIVER BUFFER and responds with an ACK. Upon receiving the ACK, node 5 sends RTS again with sequence number range 0 to 1 since the most recent DATA has not yet been sent. Node 2, upon receiving the RTS, sends CTS with sequence number 1 after examining its RECEIVER BUFFER. Node 5, upon receiving the CTS, sends the DATA with sequence number 1. Node 2, upon receiving the DATA, replies with an ACK. Again, for illustration purposes, let s say nodes 1, 3 and 4 successfully receive the DATA and update their respective RECEIVER BUFFER. Node 5, upon receiving the ACK, buffers the DATA in SEND BUFFER and elects node 3 as its next neighbor. Following the collision avoidance phase, node 5 transmits RTS with sequence number range 0 to 2. Upon receiving the RTS, node 3 examines its received sequence number list and sends CTS requesting sequence number 2 (since 0 and 1 were successfully received previously). Node 5, upon receiving CTS, transmits DATA with sequence number 2. Node 3, upon receiving DATA, transmits ACK and updates its RECEIVER BUFFER. Node 5, upon receiving ACK, buffers the DATA in SEND BUFFER, selects node 4 as it s next neighbor to transmit to, and the process resumes Figure 1. Node 5 broadcasting packets. Nodes 1, 2, 3 and 4 are within range of node 5 but not with each other. 3. ON-DEMAND MULTICAST ROUTING PROTOCOL WITH CONGESTION CONTROL The basic concept behind ODMRP is the creation of a mesh instead of a tree to route multicast packets 16, 17, 18. The source periodically probes the network for members. Upon receiving the probes, the members respond and the forwarding groups are formed. The forwarding groups create a mesh and data packets traverse through the forwarding groups to the multicast members.

4 To achieve congestion control, we examine the queue length as the network feedback criteria and use BMW as the underlying MAC layer. BMW is required for the following reason. ODMRP broadcasts data packets to all neighbors instead of delivering them point-to-point to selected individual neighbors, as commonly done by multicast protocols. The underlying MAC protocol generally used for broadcast is CSMA without ACK (to avoid ACK implosion). With CSMA, the queue length does not represent an accurate measure of congestion. Broadcast packets are delivered blindly, that is, if the packet is not received because of receive-buffer overflow or channel congestion (e.g., hidden terminal), it is dropped and no retransmission is attempt. Therefore, even in presence of congestion, the queue length will always be minimal. In contrast, the version of the IEEE protocol used in unicast, point-to-point transmissions is equipped with RTS and CTS control packets and ACKs. It is protected against receive-buffer overflow and hidden terminals, and thus provides accurate congestion feedback. This unicast version however is not attractive for multicast applications since it does not exploit the so-called broadcast advantage of the wireless channel, and requires an individual transmission to each multicast member. Therefore, BMW is needed to accurately portray the network state via queue lengths as BMW provides reliable delivery of broadcast packets Multicast route discovery In ODMRP, route discovery is initiated and maintained by the source. When the source has packets to transmit for a particular multicast group, the source first determines if there exists a route to the members of the group. If a route does not exist, ODMRP attempts to establish one via the route discovery process. The process of route discovery is similar to on-demand unicast routing protocols such as AODV 20 and DSR 11. There are two phases during route discovery: a request phase and a reply phase Request phase During the request phase, the source floods the network with a member advertisement packet with the data piggybacked. This packet is called JOIN QUERY. JOIN QUERY packets are periodically broadcasted to the entire network to refresh membership information and reestablish new multicast routes. Upon receiving a non-duplicate JOIN QUERY, a node inserts or updates in its ROUTING TABLE the upstream node address as the next node to the source node. The ROUTING TABLE will later be used when a JOIN REPLY is needed to be forwarded to the source during the reply phase. This technique is commonly known as backward learning Reply phase Once the non-duplicate JOIN QUERY reaches a multicast member, the reply phase begins. During the reply phase, the multicast member creates and broadcasts JOIN REPLY packet to the network with the address of the node the member receives the JOIN QUERY from stamped in the JOIN REPLY. Upon receiving the JOIN REPLY, a node determines if its address is stamped in the JOIN REPLY. If it is, the node realizes it is on the path to the source. The node then sets FORWARDING_GROUP_FLAG and becomes part of the forwarding group. Afterwards, the node rebroadcasts JOIN REPLY with the upstream node address to the source stamped in the JOIN REPLY. The upstream node address is obtained from the ROUTE TABLE via backward learning. This process continues until the JOIN REPLY reaches the source. Once the source receives JOIN REPLY, a mesh of nodes, or forwarding groups, is formed and packets can be delivered to the members Route maintenance ODMRP maintains the mesh by periodically broadcasting JOIN QUERY to the network and receiving JOIN REPLY in return. The periodic broadcast of JOIN QUERY will update the forwarding group nodes accordingly and adapt to membership fluctuations Multicasting data Once the source receives JOIN REPLY, data packets can be delivered to the members. The source broadcasts the data packet. Upon receiving the non-duplicate data packet, a node determines if it is a forwarding group for the data packet (by examining FORWARDING_GROUP_FLAG). All nodes in the forwarding groups then rebroadcast the packet until the packet reaches the multicast members Congestion control and other extensions We made several modifications to ODMRP described in S.J. Lee et al 17. First of all, each JOIN QUERY packet header also contains the largest mean aggregate MAC queue length thus far traversed. Furthermore, although duplicate JOIN

5 QUERYs are still discarded, the ROUTE TABLE is updated to the upstream node that transmitted the duplicate JOIN QUERY if the duplicate JOIN QUERY contains a mean aggregate queue length that is smaller than the one reported in the ROUTE TABLE. We want to always use the route back to the source with lesser congestion. The mean aggregate queue length is defined as the mean length of the queue shared by all source 21, 22. Each node computes the mean aggregate queue length as the average over queue regeneration cycles. A queue regeneration cycle is broken down into a busy and an idle period. The busy period starts when the queue transitions from empty to non-empty and ends when the queue transitions back to empty. Conversely, the idle period starts when the queue is empty and ends when the queue shifts to non-empty. It has been shown that averages computed over regeneration cycles are able to provide a good balance between the sensitivity of the current system and the stability in the measurement 22. However, simply measuring past regeneration cycles is not adequate to convey the current network state as past regeneration cycles may reflect outdated conditions and the current regeneration cycle may be significantly longer than past cycles. In order to circumvent this, we measure the mean aggregate queue length as the average over past and current (partial) regeneration cycles 15. Figure 2 illustrates the regeneration periods. Queue length N Previous cycle Averaging interval Current cycle T Figure 2. Regeneration periods. A regeneration period begins when a queue goes from empty to non-empty, and ends when the next period begins. To exercise congestion control, JOIN QUERY packets are forwarded only if the mean aggregate queue length is less than or equal to QUEUE_LENGTH_THRESHOLD. By doing so, routes that have long mean aggregate queue length, and thus may cause a bottleneck, are avoided. Upon receiving JOIN QUERY, a member will also include the mean aggregate queue length that it is currently experiencing in the JOIN REPLY sent back to the source. Nodes that are forwarding groups, upon receiving JOIN REPLY, check the mean aggregate queue length stamped in the packet. If the mean aggregate queue length is less than the current mean aggregate queue length the node is experiencing, the node s current mean aggregate queue length value will replace the one carried by the JOIN REPLY and the JOIN REPLY is unicasted to the upstream nodes. Once the source node receives the JOIN REPLY, the source adjusts its sending rate based on the mean aggregate queue length specified in the JOIN REPLY. More specifically, the source employs the following algorithm: factor = meanaggregatequeuelength * MILLI_SECOND / originalinterdepartureinterval * (100 + K); if (factor == 0) { newinterval = originalinterdepartureinterval; } else { newinterval = originalinterdepartureinterval * (factor + 1); } where MILLI_SECOND is used to convert meanaggregatequeuelength to the same unit as originalinterdepartureinterval.

6 The above algorithm adjusts the sending interval (and rate) of the source based on the maximum mean aggregate queue length along the path to the members and the original sending rate of the source. The faster the source transmits data, the more the source has to adjust. The constant K determines the degree of the adjustment. The higher the K, the more the source adapts to congestion. We choose K = 30 in our simulation experiments. Note that since ODMRP attempts route discovery periodically, the source will be able to adapt its sending rate to the ever-changing network load accordingly. We also made some enhancements to ODMRP. First, instead of aggregating JOIN REPLY packets into one bulky packet as in S.J. Lee et al 17, we modified ODMRP to transmit each JOIN REPLY separately. Our reasoning is that packets transmitted in ad hoc networks are error prone, possibly due to channel noise interference, collisions and mobility. This is the same basis behind IEEE s decision to use control frames to test the waters before transmitting the actual data. Transmitting large packets is wasteful in ad hoc networks since there is a high probability of loss. Thus, it is better to transmit packets of smaller sizes. The other beneficial side effect of this approach is that now the JOIN REPLY is transmitted much earlier than in S.J. Lee et al 17, where a node would have to wait for a certain time period to aggregate the JOIN REPLY packets before transmitting it out. Therefore, this modification also speeds up the route discovery process. Finally, instead of utilizing passive acknowledgements for each JOIN REPLY as in S.J. Lee et al 17,wechooseto exercise explicit acknowledgements. The most important step in route discovery is to form the forwarding groups; we want to explicitly make sure that the forwarding groups are properly and timely formed Backpressure vs end-to-end congestion notification The reader may have noticed that BMW by itself already provides backpressure flow control. More precisely, if the MAC queue at a node fills up, the node will drop (and not ACK) packets from upstream nodes. Consequently, because of the reliable BMW transmission mode, the queues at upstream nodes will also fill up, leading to a backpressure phenomenon that propagates back to the source. This form of congestion control alone, however, tends to be too slow, and moreover causes major backup in the entire network before having effect on the offending sources. In this paper, we have proposed an end-to-end congestion notification mechanism, similar to the ECN (Explicit Congestion Notification) scheme in TCP/IP 6, the DEC Bit scheme 21, 22 and the PRCA (Proportional Rate Control Algorithm) scheme in ATM 10. The novelty of our end-to-end notification scheme, with respect to previous schemes, is the fact that it applies equally easily to unicast and multicast; moreover, it does not require special control packets other than the periodic refresh packets. 4. SIMULATION In this section, we evaluate the effectiveness of our changes in ODMRP to support congestion control using simulation Environment ODMRP and BMW are simulated using the GloMoSim network simulator 2, 27. GloMoSim is a discrete even, parallel simulation environment implemented in PARSEC1. In our simulation, we consider a grid topology consisting of 16 nodes as shown in Figure 3 and a topology where 25 nodes are uniformly placed in a 1000m x 1000m area.

7 Figure node grid topology In Figure 3, nodes are within radio power range of their intermediate neighbors and vice versa. UDP traffic is multicasted using ODMRP with and without congestion control. When using ODMRP with congestion control, BMW is utilized as the MAC layer. When ODMRP without congestion control is applied, IEEE is deployed. Radios with no capture ability are modeled with a channel capacity of 2Mbps for each node. We assume a free-space channel with a threshold cutoff and the power of a signal attenuates as 1/d 2 where d is the distance between two nodes. Simulation results are obtained from multiple runs, each lasting 200 seconds, with varying seed numbers, and the results are averaged over the runs. Each data packet is 512B. To determine the effectiveness of our congestion control enhancements to ODMRP, we examine the packet delivery ratio of ODMRP and number of packets sent by the multicast sources with and without our congestion control mechanism (referred to as normal ODMRP). The packet delivery ratio is defined as the number of actual packets received by the multicast members over the number of packets that the members are supposed to receive. The packet delivery ratio metric measures the effectiveness of a multicast routing protocol Results We examine ODMRP, with and without congestion control, first using a contrive scenario. In this scenario, nodes 0 through 3 in Figure 3 are the multicast sources and nodes 12 through 15 are the multicast members. Source 0 through source 3 starts transmitting data ten seconds after one another. Multiple experiments are run using varying interdeparture rates. The results of our simulation are depicted in Figure 4. Grid Experiment Packet Delivery Ratio MS 100MS 150MS 200MS 250MS 300MS 350MS 400MS 450MS 500MS Packet Interdeparture Rate Normal Congestion Control Figure node grid experiment (packet delivery ratio) From Figure 4, we observe that the packet delivery ratio of normal ODMRP collapses under high traffic load, receiving a mere 20% packet delivery ratio with a packet interdeparture rate of 50ms. The low packet delivery ratio is attributed to

8 the fact that under high load, the network becomes congested. At the same time, the sources continue to maintain their high sending rate, which leads to packet drops due to queue overflow and packet collisions (hidden terminals). On the other hand, the aggressive sources have no effect on the packet delivery ratio of ODMRP with congestion control. As sources become aggressive, the mean aggregate queue length feedback sent from the members back to the source via JOIN REPLY informs the sources that the network has become congested and that the sources should decrease their sending rate based on the level of congestion indicated by the JOIN REPLY. By reducing the send rate, and thus the network load, ODMRP with congestion control is able to deliver data packets at or near the optimal packet delivery ratio (100%). As the interdeparture rate decreases, both versions of ODMRP were able to achieve perfect packet delivery ratio, as expected. Figure 5 provides another viewpoint of the congestion control effect. We observe here that with congestion control, the sources maintain a relatively constant number of packet transmissions (at or below 10,000 packets) that is independent of the original sending rate. Moreover, as the sending rate decreases, the number of packets sent by the sources with and without congestion control converges since there is no longer a need for congestion control at low sending rates. Grid Experiment Number of Packets Sent MS 100MS 150MS 200MS 250MS 300MS 350MS 400MS 450MS 500MS Packet Interdeparture Rate Normal Congestion Control Figure node grid experiment (number of packets sent) We now compare the behavior of normal ODMRP and ODMRP with congestion control in a more random environment. To this end, we uniformly placed 25 nodes in a 1000m x 1000m area. Five multicast sources are sending data to five multicast receivers, with each source starting the data transmission ten seconds after the other. The transmission range of each node is 300m. The results are given in Figure 6. Uniform Experiment Packet Delivery Ratio MS 100MS 150MS 200MS 250MS 300MS 350MS 400MS 450MS 500MS Packet Interdeparture Rate Normal Congestion Control Figure 6. Uniform experiment (packet delivery ratio)

9 Note that the graph in Figure 6 resembles that in Figure 4. We again observe that the packet delivery ratio of ODMRP with congestion control is near optimal to optimal under all traffic rates whereas under normal ODMRP, the packet delivery ratio is inversely proportional to the sending rate. Similar to Figure 5, Figure 7 provides another perspective of the network behavior in terms of the total number of packets sent by the sources with and without congestion control. Uniform Experiment Number of Packets Sent MS 100MS 150MS 200MS 250MS 300MS 350MS 400MS 450MS 500MS Packet Interdeparture Rate Normal Congestion Control Figure 7. Uniform experiment (number of packets sent) Not surprisingly, the results of Figure 7 mirror those of Figure 5; the number of packets sent under ODMRP with congestion control remains relatively constant while, without congestion control, the number of packets sent is directly coupled to the initial sending rate. Next, we examine a typical ad hoc scenario where nodes move. Here, 25 nodes are initially placed in a 1000m x 1000m area. Again, five multicast sources are sending data to five multicast receivers, with each node having a transmission power of 300m. We use the random waypoint mobility model, where a node randomly selects a destination from the 1000m x 1000m area and then moves in the direction of the selected destination with a certain speed. Once the destination is reached, the node chooses another destination and the process repeats over again. In this experiment, we vary the mobility speed, ranging from 10 meters per second to 50 meters per second. Each multicast source sends data at a packet interdeparture rate of 200ms. The simulation result is shown in Figure 8. Mobility Experiment Packet Delivery Ratio Speed (m/s) Regular Congestion Control Figure 8. Mobility experiment (packet delivery ratio) The results indicate that ODMRP with congestion control performs better in the mobile environment as mobility speed increases. We first observe that regular ODMRP degrades as mobility speed rises. The packet delivery ratio ranges from 72% for mobility speed of 10m/s to 64% as mobility speed increases to 50m/s. The performance exhibit here is

10 worse than the static scenario reported in Figure 6 due to packet loss caused by mobility; the faster the nodes move, the higher the loss rate. Note that the packet delivery ratio of regular ODMRP is still quite sufficient in this mobile scenario. This robustness to mobility is due to the redundancy of ODMRP s mesh approach, i.e., the forwarding group. However, under ODMRP with congestion control, the behavior is reversed. The packet delivery ratio of ODMRP with congestion control actually increases! This result is counter-intuitive, as we would expect the performance to degrade as well due to loss caused by mobility. However, a closer examination reveals that as mobility speed increases, the multicast sources actually reduce their sending rate. This is because of two reasons. First of all, the multicast sources will reduce its transmission rate when the network is congested. Secondly, the multicast sources do not send any further data until the congestion information propagates back to the sources via JOIN TABLE. The rationale is that since no JOIN TABLEs are received, the network is most likely congested or exhibiting high error rates, possible due to channel noise or mobility. Therefore, no further data should be sent. Instead, new JOIN QUERY packets are sent out at intervals to probe the network until JOIN TABLEs are received (i.e., when the network is more stable). These two actions diminish the number of data packets that are transmitted as mobility increases. Figure 9 shows the number of packets sent by regular ODMRP and ODMRP with congestion control in the mobile scenario. Mobility Experiment Number of Packets Sent Speed (m/s) Regular Congestion Control Figure 9. Mobility experiment (number of packets sent) Figure 9 reveals that regular ODMRP maintains a constant transmission rate irrespective of the mobility speed, as expected. However, under ODMRP with congestion control, the total number of packets decreases as the mobility speed increases. The decrease in the number of packets sent in response to mobility speed reduces the network traffic, which in turn increases the probability of successful reception at the multicast receivers. We see from Figure 9 that the number of packets sent decreases with mobility speed under ODMRP with congestion control. Therefore, since fewer packets are sent as mobility speed increases, there is less network congestion as nodes move faster. This leads to a higher packet delivery ratio, although overall throughput is sacrificed. 5. CONCLUSION In this paper, we have presented a novel MAC protocol, BMW, which reliably delivers broadcast packets, and extend ODMRP to support network level congestion control using the mean aggregate queue length as the network feedback metric. Alternatively, the instantaneous queue length could also be utilized. We choose the mean aggregate queue length over the instantaneous queue length due to the fact that the instantaneous queue length feedback does not take into consideration bursty and non-uniform traffic. Under bursty and non-uniform traffic, the instantaneous queue length measurement would provide an erroneous view of the network condition to the multicast sources. In addition to congestion control, we have introduced BMW, a wireless ad hoc MAC protocol that supports reliable broadcasting of data and provides a means to obtain effective congestion feedback. We argue that in a broadcast scenario the MAC queue maintained by conventional wireless ad hoc MAC protocols, such as IEEE (broadcast version), do not accurately reflect the contention level of the network, and therefore claim for the need for a new scheme such as BMW to address this issue. Finally, through simulation we show that ODMRP with congestion control running on top of

11 BMW effectively and accurate adapts to the network load. One important point to emphasize is that the propagation model used in the experiments is the free-space model. Free-space is a relatively conservative channel model in wireless networks as wireless links are more prone to errors than what the free-space channel models. Under more realistic propagation models, the advantages of using BMW become more evident. One drawback of BMW, however, is that as the number of neighbors increases for any given node, the time needed to guarantee delivery to all neighbors also grows. This problem can be addressed by decreasing the radio s transmit power to limit the number of neighbors. Decreasing the radio s transmit power also provides the added advantage of reducing power consumption, which is paramount in wireless ad hoc networks. Currently, BMW is needed in order to implement ODMRP with congestion control. However, exporting the reliability concept of BMW into ODMRP can decouple this relationship between the network and MAC layer. That is, the neighbors in BMW can be mapped to the forwarding group nodes in ODMRP. Thus, only the neighbors that are part of the forwarding group need to be reliably delivered to. This reduction in guaranteeing reliable delivery from all neighbors to a subset of the neighbors (the forwarding group) will improve network congestion. Work is in progress in several directions including: decoupling ODMRP from BMW, investigation of more refined rate adjustment mechanisms, fairness among UDP multicast sessions sharing the same bottlenecks, friendliness of multicast streams to unicast, and application to other wireless multicast protocols (e.g., multicast AODV). REFERENCES 1. R. Bagrodia, R. Meyer, et al, PARSEC: A Parallel Simulation Environment for Complex System, Computer Magazine, R. Bagrodia and M. Gerla, A Modular and Scalable Simulation Tool for Large Wireless Networks, International Conference on Modeling Techniques and Tools for Computer Performance Evaluation, V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, MACAW: A Media Access Protocol for Wireless LAN's, ACM SIGCOMM, E. Bommaiah, M. Liu, A. McAuley, and R. Talpade, AMRoute: Ad-hoc Multicast Routing Protocol, Internet- Draft, draft-talpade-manet-amroute-00.txt, Aug. 1998, Work in progress. 5. Editors of IEEE , Wireless LAN Medium Access Control (MAC and Physical Layer (PHY) specifications, Draft Standard IEEE , S. Floyd, TCP and Explicit Congestion Notification, ACM Computer Communication Review, V. 24 N. 5, October C. Fullmer and J.J. Garcia-Luna-Aceves, Floor Acquisition Multiple Access (FAMA) for packet radio networks, Computer Communication Review, vol. 25, (no. 4), (ACM SIGCOMM '95, Cambridge, MA, USA, 28 Aug.-1 Sept ) ACM, Oct J.J. Garcia-Luna-Aceves and E.L. Madruga, The Core-Assisted Mesh Protocol, IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, Aug. 1999, pp J. Haartsen, M. Naghshineh, J. Inouye, O.J. Joeressen, and W. Allen, Bluetooth: Vision, Goals, and Architecture, ACM SIGMOBILE Mobile Computing and Communications Review, vol. 2, no. 4, Oct. 1998, pp M. Hluchy et al, Closed Loop Rate-Based Traffic Management, Technical Report, ATM Forum, September D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Pusblishers, Anthony Joseph, B. R. Badrinath, and Randy Katz, A Case for Services over Cascaded Networks, First ACM/IEEE International Conference on Wireless and Mobile Multimedia (WoWMoM'98), Dallas, Texas, October 30, John Jubin and Janet D. Tornow, The DARPA Packet Radio Network Protocols, Proceedings of the IEEE, Jan P. Karn, MACA A New Channel Access Method for Packet Radio, in ARRL/CRRL Amateur radio 9th Computer Networking Conference, ARRL, S. Keshav, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone Network, Addison-Wesley, Menlo Park, California, S.-J. Lee, M. Gerla, and C.-C. Chiang, On-Demand Multicast Routing Protocol, Proceedings of IEEE WCNC'99, New Orleans, LA, Sep. 1999, pp

12 17. S.-J. Lee, W. Su, J. Hsu, M. Gerla, and R. Bagrodia, A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols, Proceedings of IEEE INFOCOM2000, Tel Aviv, Israel, Mar S.-J. Lee, W. Su, and M. Gerla, Internet Draft, draft-ietf-manet-odmrp-02.txt, Jan K.J. Negus, J. Waters, J. Tourrilhes, C. Romans, J. Lansford, and S. Hui, HomeRF and SWAP: Wireless Networking for the Connected Home, ACM SIGMOBILE Mobile Computing and Communications Review, vol. 2, no. 4, Oct. 1998, pp C. E. Perkins and E. M. Royer, Ad-Hoc On Demand Distance Vector Routing, Proceedings of the 2 nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, Feb K. K. Ramakrishnan and R. Jain, A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with a Connectionless Network Layer, Proceedings of ACM SIGCOMM 88, Stanford, August K. K. Ramakrishnan and R. Jain, A Binary Feedback Scheme for Congestion Avoidance in Computer Networks, ACM Transactions on Computer Systems, Vol. 8, No. 2, E. M. Royer and C. E. Perkins, Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol, Proceedings of ACM/IEEE MOBICOM 99, Seattle, WA, Aug Andrew S. Tanenbaum, Computer Networks: Third Edition, Prentice Hall PTR, New Jersey, K. Tang and M. Gerla, MAC Reliable Broadcast in Ad Hoc Networks, MILCOM 2001, McLean, Virginia, October C.W. Wu, Y.C. Tay, and C.-K. Toh, Ad hoc Multicast Routing Protocol utilizing Increasing id-numbers (AMRIS) Funcational Specification, Internet-Draft, draft-ietf-manet-amris-spec-00.txt, Nov. 1998, Work in progress. 27. X. Zeng, R. Bagrodia and M. Gerla, GloMoSim: a Library for the Parallel Simulation of Large-scale Wireless Networks, PADS, 1998.

MAC RELIABLE BROADCAST IN AD HOC NETWORKS

MAC RELIABLE BROADCAST IN AD HOC NETWORKS MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los

More information

Effects of Ad Hoc MAC Layer Medium Access Mechanisms under TCP

Effects of Ad Hoc MAC Layer Medium Access Mechanisms under TCP Mobile Networks and Applications 6, 317 329, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Effects of Ad Hoc MAC Layer Medium Access Mechanisms under TCP KEN TANG, MARIO CORREA

More information

Dynamic Load-Aware Routing in Ad hoc Networks

Dynamic Load-Aware Routing in Ad hoc Networks Dynamic Load-Aware Routing in Ad hoc Networks Sung-Ju Lee Internet & Mobile Systems Labs Hewlett-Packard Laboratories Palo Alto, CA 9434-6 sjlee@hpl.hp.com Mario Gerla Computer Science Department University

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks

RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks RMAC: A New MAC Protocol with Reliable Multicast Support for Wireless Ad-Hoc Networks Weisheng Si, ws4u@cs.virginia.edu Huafeng Lü, hl3d@cs.virginia.edu Dec 6th, 00 1 Introduction In most of the MAC protocols

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks

Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Ken Tang, Mario Gerla {ktang, gerla}@cs.ucla.edu Wireless Adaptive Mobility Laboratory Computer Science Department University of California, Los

More information

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL REEARCH REPORT Multicast Routing in Mobile Ad Hoc Networks Using ource Grouped Flooding by Karthikeyan Chandrashekar, John. Baras CHCN TR 00-6 (IR TR 00-) The Center for atellite and Hybrid Communication

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed

Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed Sang Ho Bae, Sung-Ju Lee, and Mario Gerla Wireless Adaptive Mobility Laboratory Computer Science Department University of California

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV)

Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV) Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV) Aparna K Lecturer, Dept. of Master of Computer Applications BMS Institute of Technology, Bangalore, India.

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh E-: Enhanced with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, and Mario Gerla Computer Science Department, University of California, Los Angeles {soonoh, jspark, gerla}@cs.ucla.edu Abstract On

More information

Preemptive Multicast Routing in Mobile Ad-hoc Networks

Preemptive Multicast Routing in Mobile Ad-hoc Networks Preemptive Multicast Routing in Mobile Ad-hoc Networks Uyen Trang Nguyen and Xing Xiong Department of Computer Science and Engineering York University, Toronto, Ontario Canada, M3J 1P3 Email: {utn, xing}@cs.yorku.ca

More information

/99/$10.00 (c) 1999 IEEE

/99/$10.00 (c) 1999 IEEE COLLISION-FREE MEDIUM ACCESS CONTROL SCHEME FOR AD-HOC NETWORKS Zygmunt J. Haas and Jing Deng School of Electrical Engineering Cornell University Ithaca, NY 14853 haas@ee.cornell.edu Siamak Tabrizi US

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Multicast over Vehicle Ad Hoc Networks

Multicast over Vehicle Ad Hoc Networks 1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network

Cellular Learning Automata-based Channel Assignment Algorithms in Mobile Ad Hoc Network ISBN 978-1-84626-xxx-x Proceedings of 2009 International Conference on Machine Learning and Computing Perth, Australia, 10-12 July, 2009, pp. xxx-xxx Cellular Learning Automata-based Channel Assignment

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Reliable Multicast MAC Protocol for Wireless LANs

Reliable Multicast MAC Protocol for Wireless LANs Reliable Multicast MAC Protocol for Wireless LANs S. K. S. Gupta, V. Shankar, S. Lalwani Department of Computer Science and Engineering Arizona State University, Tempe, AZ - 85287 Email: Sandeep.Gupta@asu.edu

More information

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:

More information

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Ishwari Singh Rajput Department of Computer Science and Engineering Amity School of Engineering & Technology, Amity University, Noida,

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing

QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing Vida Lashkari. O., Mehdi Dehghan Abstract Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity

More information

TCP over Wireless Multi-hop Protocols: Simulation and Experiments

TCP over Wireless Multi-hop Protocols: Simulation and Experiments TCP over Wireless Multi-hop Protocols: Simulation and Experiments Mario Gerla, Rajive Bagrodia, Lixia Zhang, Ken Tang, Lan Wang {gerla, rajive, lixia, ktang, lanw}@cs.ucla.edu Wireless Adaptive Mobility

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks

RMAC: A Reliable Multicast MAC Protocol for Wireless Ad Hoc Networks RMAC: A Reliable Multicast MAC Protocol Wireless Ad Hoc Networks Weisheng Si and Chengzhi Li Department of Computer Science, University of Virginia Email: {ws4u, cl4v}@cs.virginia.edu Abstract This paper

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS 1 R. INDIRANI, 2 ARUCHAMY RAJINI 1 M. Phil Research Scholar, 2 Associate Professor 1&2 PG & Research Department of Computer Science, 1&2 Hindusthan

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol 1 Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Katia Obraczka, Sung-Ju Lee, and Mario Gerla Abstract Typical applications of mobile ad hoc networks (MANET) require group-oriented services.

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Thomas Kunz and Ed Cheng Carleton University tkunz@sce.carleton.ca Abstract. Multicasting can efficiently support a variety of applications that

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks

Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks B. Ravi Prasad Dr.A.Damodaram Dr.G.Venkateswara Rao Research Scholar, CSE Department Professor in CSE Associate

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications.

#$% * #$%+ $ (% Enables community-centric applications: Military and law enforcement. Search and rescue applications. Enables communitycentric applications: Military and law enforcement Search and rescue applications Foad Hamidi Amir Ali Ghadiri Online gaming Possibly email and file transfer! Limited radio propagation

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Interactions Between TCP and the IEEE MAC Protocol

Interactions Between TCP and the IEEE MAC Protocol Interactions Between TCP and the IEEE 82.11 MAC Protocol Rui Jiang Vikram Gupta Computer Science and Engineering Department University of California, Riverside Chinya V. Ravishankar Abstract The IEEE 82.11x

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering

On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering On Demand Routing in Large Ad Hoc Wireless Networks with Passive Clustering Mario Gerla, Taek Jin Kwon and Guangyu Pei Computer Science Department University of California, Los Angeles Los Angeles, CA,

More information

Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing

Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing Computer and Information Science Vol. 3, No. 2; May 2010 Impact of Route Selection Metrics on the Performance of On-Demand Mesh-based Multicast Ad hoc Routing Natarajan Meghanathan (Corresponding Author)

More information

Reliable Adaptive Lightweight Multicast Protocol

Reliable Adaptive Lightweight Multicast Protocol Reliable Adaptive Lightweight Multicast Protocol Ken Tang Scalable Network Technologies ktang@scalable-networks.com Katia Obraczka UC Santa Cruz katia@cse.ucsc.edu Sung-Ju Lee HP Labs sjlee@hpl.hp.com

More information

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

MZRP: An Extension of the Zone Routing Protocol for Multicasting in MANETs

MZRP: An Extension of the Zone Routing Protocol for Multicasting in MANETs JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 20, 535-551 (2004) MZRP: An Extension of the Zone Routing Protocol for Multicasting in MANETs Centre for Internet Research School of Computing National University

More information

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks On the Impact of Noise Sensitivity on Performance in 82.11 Based Ad Hoc Networks Saman Desilva Computer Science Department The Univ. of Texas at San Antonio, San Antonio, TX 78249 Email: sdesilva@cs.utsa.edu

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS

UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS UNDERSTANDING THE INTERACTIONS BETWEEN UNICAST AND GROUP COMMUNICATIONS SESSIONS IN AD HOC NETWORKS Lap Kong Law, Srikanth V. Krishnamurthy and Michalis Faloutsos Department of Computer Science & Engineering

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS

AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE NETWORKS AN ANALYSIS OF THE MODIFIED BACKOFF MECHANISM FOR IEEE 802.11 NETWORKS Marek Natkaniec, Andrzej R. Pach Department of Telecommunications University of Mining and Metallurgy al. Mickiewicza 30, 30-059 Cracow

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols

A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, and Rajive Bagrodia Wireless Adaptive Mobility Laboratory Computer Science Department

More information

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks Second International Conference on Networking and Distributed Computing Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks Zhilin Zhang School of Computer Science & Technology

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks

Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Dimitri Marandin Chair for Telecommunications, Electrical Engineering Department Technical University of Dresden, Dresden, Germany

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Md. Abdullah-Al-Mamun, M. Mahbubur Rahman Department of Information and Communication Engineering Islamic University Kushtia

More information

Implementation and Validation of Multicast-Enabled Landmark Ad-hoc Routing (M-LANMAR) Protocol

Implementation and Validation of Multicast-Enabled Landmark Ad-hoc Routing (M-LANMAR) Protocol Implementation and Validation of Multicast-Enabled Landmark Ad-hoc Routing (M-LANMAR) Protocol Yunjung Yi, Joon-Sang Park, Sungwook Lee, Yeng-Zhong Lee, and Mario Gerla Computer Science Department University

More information

Tarek Sheltami. CCSE COE 3/8/2008 1

Tarek Sheltami. CCSE COE  3/8/2008 1 Mobile Ad hoc Networks COE 549 Random Access I Tarek Sheltami KFUPM CCSE COE http://faculty.kfupm.edu.sa/coe/tarek/coe549.htm 3/8/2008 1 Outline Medium Access Control Protocols ALOHA BTMA CSMA Some simulation

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information