Abstract. Wireless ad-hoc networks (WANETs) are innately different from the well-known wired

Size: px
Start display at page:

Download "Abstract. Wireless ad-hoc networks (WANETs) are innately different from the well-known wired"

Transcription

1 Abstract Wireless ad-hoc networks (WANETs) are innately different from the well-known wired networks and have a totally new architecture. A few problems arise from the two main traits of WANETs: self-organization and data transfer. Research work has been done to find out an efficient way to transfer data between nodes. The structure of a WANET keeps constantly changing making data transfer even more difficult. In this research project, two specific techniques are integrated. Cooperative communication and network coding can improve the performance of a WANET. Cooperative communication in a WANET makes use of alternate/neighboring nodes to pass on the information that is overheard. This helps in dealing with network performance issues. Network coding combines several packets together for communication, is very useful to reduce redundancy and can increase overall throughput of the network. Adding network coding to cooperative communication helps the nodes to assist other nodes while they serve their own traffic. To make use of the benefits brought by both network coding and cooperative communication, an efficient medium access control (MAC) protocol is required. In this research project, a network coding aware cooperative MAC protocol (NCAC-MAC) for wireless ad-hoc networks is used to enhance the performance of the WANET. i

2 TABLE OF CONTENTS Abstract... i Table of Contents... ii List of Figures iv 1. Background and Rationale Introduction CSMA Fading Routing in Wireless Networks Cooperative MAC Protocol A MAC Protocol for Cooperative Communication Using Multi-Channel Multi-Interface Protocol in Wireless Ad hoc Networks Blind Cooperative Communication A New Cooperative MAC Strategy Proposed Approach: A Network Coding Aware Cooperative MAC Protocol Two-Relay Based Cooperative Communication Narrative Problem Statement Motivation Functionalities System Design Proposed System/System Protocol Overview of Various Software Packages ii

3 4. System Implementation Configuring and Creating Nodes Selecting Relay Nodes for Data Transmission Exchanging Frames (ACK and NACK) Analyzing Throughput Evaluation and Results Testing Test Cases Conclusion and Future Work Bibliography and References Appendix iii

4 LIST OF FIGURES Figure 1 Routing in Wireless Network...3 Figure 2 Cooperation at MAC Layer...3 Figure 3 Cooperative Communication...5 Figure 4 Multi-route from Source to Destination...8 Figure 5 Cooperative Group Model...9 Figure 6 Scenario of Coded Re-transmission, Both Source and Relay Node having the Same Destination...10 Figure 7 Frame Exchanging Process under the Condition that Direct Transmission Fails...15 Figure 8 Flowchart of the State Transmission for a Transmitting Packet...16 Figure 9 Source, Destination and Relay Nodes Figure 10 Number of Nodes Set to Figure 11 Network Animator with 120 Nodes. 24 Figure 12 Source, Destination and Relay Nodes in a Network Animator (NAM)..25 Figure 13 Closer Look at Source, Destination and Relay Nodes Figure 14 Data Transmission Starts Figure 15 Graphical Output for Throughput Figure 16 Number of Nodes Set to Figure 17 Network Animator with 5 Nodes iv

5 Figure 18 Source and Destination Nodes in a Network Animator (NAM)...30 Figure 19 Graphical Output for Throughput...31 Figure 20 Number of Nodes Set to Figure Nodes in Network Animator...33 Figure 22 Source, Destination and Relay Nodes in Network Animator-A...34 Figure 23 Source, Destination and Relay Nodes in Network Animator-B Figure 24 Graphical Output for Throughput Figure 25 Success Rate.. 36 v

6 1. Background and Rationale 1.1 Introduction Cooperative Communication has a lot of advantages and disadvantages/challenges. Every algorithm/technique involving cooperative communication is an attempt to overcome the disadvantages and make use of the advantages it offers. In cooperative communication, nodes take the help of relay nodes to complete the communication or to complete the data transfer from source to destination. Issues like fading and collisions are very common in this case and have to be tackled for a decent network performance CSMA Carrier sense multiple access is a MAC protocol in which a node checks if the channel is not serving other traffic in a shared medium. Sensing a carrier means getting notified by a node to which data transfer is attempted that it is currently handling other traffic and so it cannot participate in another transmission until it completes its current transmission. In such case, the carrier is sensed and the station has to wait before it attempts to transfer data again. It simply follows a principle called Listen before you talk. CSMA with collision detection; In this case, performance has been improved by canceling the transmission whenever a collision is detected. Thereby reducing the time before the source node/transmitter attempts again to transfer data. CSMA with collision avoidance; in this case, if a channel is sensed busy it simply waits for a random time before attempting for transmission again. Thereby reducing the chances of collisions. 1

7 1.1.2 Fading Fading in wireless communication occurs due to loss in intensity of the signal through propagation media. Fading depends on factors like time, radio frequency [6]. A channel that experiences fading is known as a fading channel. Fading can be a consequence of multipath distribution or shadowing. Shadowing is loss of signal due to large obstructions like a hill or a building between transmitter and receiver. However just solving network fading and collision problems will not make the data transfer simple and effective. Many other issues come into picture when using cooperative communication in a wireless ad hoc network. Some of those network issues and the solutions proposed in the literature are discussed in the following section Routing in Wireless Networks There are basically two ways of sending packets to the destination in a wireless environment, they are: Uni-path routing and full-flood [9]. Uni-path routing choses a single path in a network to complete the data transmission (Figure 1). If there is a node or link failure, the data transmission fails because there is no back-up path to complete the transfer. The power and time to complete the transfer is minimum because the number of hops to reach the destination is less. But reliability is not taken care in such a method. Whereas in full-flood, the source node simply broadcasts the packets through all the neighbor nodes. This approach has higher reliability but also has more unnecessary transmissions. 2

8 Figure 1. Routing in Wireless Network [9]. 1.2 A Cooperative MAC Protocol A cooperative MAC protocol is used to improve the speed at which data is transferred. In wireless Ad hoc network, the network topology is dynamic and a fixed routing algorithm for transferring data will not work. If data transmission from source to destination without any interference from other nodes is called direct transmission. When the rate of transferring the data is slow between the source and destination, continuing with the transmission will lead to longer wait times and further performance degradation [1]. 3

9 Figure 2. Cooperation at MAC Layer To avoid this the neighboring nodes help the source node to transfer data to the destination node [1]. In Figure 2, the source node tries to transfer data to destination node at 1Mbps, whereas the data transfer using a relay node can be completed at a very higher speed. This cooperative MAC protocol outruns the traditional methods of data transfer in a wireless Ad hoc network in terms of network performance and throughput. 1.3 A MAC Protocol for Cooperative Communication The source node with the help of neighboring nodes sends the information to the destination node. These nodes that help the source node for completing the communication are known as relay nodes. Selecting these relay nodes is a very challenging task because if all the nodes 4

10 participate in the communication there will be an increase in the network overhead and power is also wasted in this process [5]. So, instead of each and every node taking part in completing the data transfer, the source node decides which relay nodes should help its data transfer. When a relay node gets a data packet it checks for the group ID (Figure 3). If the group ID is same, it will become a relay node for the communication else it will simply drop the packet. Figure 3. Cooperative Communication. The number of nodes aiding in the data transfer is strictly linked with the network density. Results show that the network performance has increased when the network density is low and has no effect when the network density is high [5]. 5

11 Networks 1.4 Using Multi-Channel Multi-Interface Protocol in Wireless Ad hoc Improving overall performance of an ad hoc network is a priority because of the growing demand of these kind of networks. Nodes compete to transfer data in a single shared channel, in such an environment the throughput degrades whenever there is a rapid increase in the network density or when the network density is high. Collisions also occur as different nodes cannot transfer data at the same bandwidth. To address these issues, a concept called multiple interfaces was introduced [3]. Nodes can now transfer data without worrying about different nodes transferring data simultaneously with the same bandwidth. With the decrease in interface costs, it has become easy to deploy nodes with multiple wireless interfaces. There exist wireless networks that use multiple interfaces, but they have limited features. In these multiple interface wireless networks, a node can use a different interface only when it has an exclusive purpose for it to do so. Moreover, these multiple interfaces cannot be utilized when the nodes are participating only in reception or data transmission [3]. Therefore, a new protocol for multiple interfaces in a MAC layer was introduced to overcome the drawbacks of the already existing systems, thereby making complete use of the features offered by multiple interfaces in wireless networks with multi-channel for improved network performance. This protocol dynamically assigns channels to nodes and schedules data transfers to make sure that there are no collisions. 6

12 1.5 Blind Cooperative Communication The performance of a cooperative communication mainly depends on the relay selection. For selecting a relay node, network state information and channel state information are considered. But in wireless Ad hoc networks the channel state information is random, and the network state information changes rapidly because there is no fixed network topology. In such an environment, the task of scheduling a relay node is extremely challenging. There have been methods to implement cooperative communication by handling network state information and channel state information. But it is evident from this discussion that these methods are complex and need a lot of additional signaling for data transmission to be successful. A method for cooperative communication has been proposed. In the proposed approach, there is no need for the data transmission/communication to worry about the network state information or the channel state information. It simply makes use of the broadcast feature of the wireless Ad hoc network to reduce the transmission power. 7

13 Figure 4. Multi-route from Source to Destination As a result, overhead due to forwarding of redundant data will be removed. This procedure helps the relay node and the destination node to overhear or listen to the data from two-hop away upstream nodes along a multi-hop route as shown in Figure A Cooperative MAC Strategy This approach focuses on deciding which relay nodes should help the transmission and which relay nodes should not help. In Section 1.3, an approach has been discussed in which a network generates a random group ID and through which data transfer mechanism works. Here, cooperative groups among the nodes are formed. These cooperative groups are not fixed; they keep changing, and a node can belong to two different cooperation groups. To create this cooperation group, a node s radio coverage is taken into consideration, and the nodes that fall into this radio range are said to be in one group. 8

14 Figure 5. Cooperative group model. In Figure 5, assume that node A and node B are source and destination nodes respectively. Given their radio coverage ranges, node C and node D can become the relay node. As these nodes come under both the radio coverage ranges of nodes A and B. This method consumes a lot of power which is a major disadvantage. Apart from that, simulation and analysis results reveal that this method has significantly increased network performance. 9

15 Protocol 1.7 Proposed Approach: A Network Coding Aware Cooperative MAC Despite all the discussed approaches for data transfer in wireless ad hoc networks, the extent to which research and development can be done in this area is high. In the traditional methods for data transfer, the relay node will stop serving its own traffic to help the source node. However, in heavy traffic conditions such an approach is not recommended, so the relay node can serve its own traffic and also help the source node simultaneously. For this to happen, as shown in Figure 6, the two packets x and y have to be combined. Network coding is a useful method for combining such packets in a network. Figure 6. Scenario of Coded Re-transmission, Both Source and Relay Node having the Same Destination. 10

16 Networks: 1.8 Two Relay Based Cooperative MAC Protocol for Wireless Ad hoc The main goal of cooperative communication approach is improved network throughput and reliability and minimum network overhead. Usually when the network throughput is improved it decreases reliability to some extent, maintaining balance between both throughput and reliability is important in building a MAC protocol. CoopMAC (Cooperative MAC protocol) proposed by Lui either choses a direct path or a relay path based on the transfer rates. This increases the average throughput of the network to some extent. But in fading conditions, the network is not reliable because it is not handling failures and has only one path. Agarwal proposed another MAC protocol which has improved average throughput and delay performance when compared with lui s CoopMAC protocol. This approach has a back-up path in case of link or node failures. This increases the reliability of the network which helps the throughput of the network too [10-12]. 11

17 2. NARRATIVE 2.1 Problem Statement Cooperative MAC protocol is usually categorized into two types 1) proactive-cooperative MAC and 2) Reactive cooperative MAC. The proactive-cooperative MAC approach enables the neighboring node (relay node) selection before the direct transmission starts. This approach will introduce consistent overhead to all transmissions irrespective of required cooperative communication. Further, reactive cooperative MAC selects the neighboring node (relay node) only when the direct transmission fails. One main disadvantage here is every neighbor node has to listen to the source node that requires additional energy. In this paper, the focus is on reactive cooperative transmission when the direct transmission fails. The general assumption in reactive cooperative transmission is that relay nodes help the source node without serving their own traffic (delivering their own data). But the relay nodes prioritize their own traffic over the source node packets. 2.2 Motivation Introducing network coding retransmission in cooperative communication is a growing concern in recent years. Making use of the advantages of both network coding and cooperative transmission is the prime objective to improve the network performance. With this approach, the relay nodes can serve their own traffic and help the source node for data transfer simultaneously. Some of the major drawbacks in the existing systems are [8]: 12

18 1) Network coding is not warranted. And there is a lot of ambivalence that a selected relay node will hold a packet that can be coded with the retransmission packet. 2) Selecting a relay node with good data transfer rate is not considered. A selected relay node may have a data rate very low compared to other relay nodes in the network. 3) Queues are not considered. A relay node with large queueing packets have to be considered over other relay nodes to decrease the overall delay. 2.3 Functionalities In order to address all the problems discussed, a novel cooperative MAC protocol using network coding is proposed with the following features: 1) Involving relay nodes in cooperative coded retransmission. 2) Selecting relay nodes based on their characteristics and making use of cooperative communication. 3) Using efficient collision-free relay selection methods instead of the random backoff scheme. 13

19 3. System Design 3.1 Proposed System/Protocol Design In this section, the proposed protocol is discussed in detail by introducing the frame exchanging process for network coding aware cooperative MAC protocol. In this protocol, there are two approaches: 1) Network coding aware cooperative retransmission and 2) pure cooperative retransmission. Considering a common assumption made in previous work in this protocol, the network has multiple nodes (wireless stations/devices) which have equal transmitting strength, buffer size, and data rates. Apart from the traditional ACK (acknowledgment) and NACK (negative acknowledgment) frames, there is an (ETH) Eager to help frame to decide on the relay node in a network. If the surrounding channel is busy, the source node waits for the distributed inter-frame space for some random backoff time. Once the backoff counter is zero, it starts transferring the packet. However, it tries to transfer the packet through direct transmission, if direct transmission fails this protocol will be used (Figure 7). There are four possible cases in this method. They are: 1) Successful transmission, the payload will be decoded at the destination node ad acknowledgment will be sent to the source node and the source node handles next packets in the queue, if any. 14

20 2) If the signal to interference noise ratio is above the threshold value, but the payload is corrupted, the destination node will send a negative acknowledgment with SINR flag set to 0 indicating that the packet is capable for coded retransmission. Figure 7. Frame Exchanging Process under the Condition that direct Transmission Fails. 3) If signal to interference noise ratio is below the threshold value and the payload is corrupted, the destination node will send a negative acknowledgment with SINR flag set to 1 indicating that coded retransmission is not recommended. 4) If the payload and header both are corrupted, harsh channel conditions can lead to such situations, the source node will time out and start the transfer again. 15

21 Figure 8. Flowchart of the State Transmission for a Transmitting Packet. Any node in the network will first be in idle state till it receives a packet. Once a node receives a packet it checks if the channel is idle or not, if it is idle itt will back off for some random time and start dataa transmission. After the data transmission the node will wait for acknowledgment, if it receives acknowledgment it goes back to idle state else itt starts pure cooperativee retransmission and then goes back to idle state ( Figure 8). 16

22 After the creation of an Ad hoc network with the number of nodes given by the user, the process selects the source and destination dynamically and selects the relay nodes between source and destination to reach the destination. These relay nodes are selected based on the nodes information like the energy of a node, number of hops required, and distance. Once these relay nodes are selected, data transmission takes place between source and destination through the relay nodes. Based on the time delay for transmission the process confirms if the node is transmitting the data or not, by giving acknowledgment. A cooperative neighbor node is being selected, through which data will be transmitted from the previous relay node that now acts as a source node. This is done after getting the negative acknowledgment, and the node simply drops the packet. So there is no need for the transmission to start again from the initial source node. Every event in the network will be recorded in the trace file. As this trace file difficult to read, network animator with the help of a scripting language can generate graphical output from the trace file. 3.2 Overview of Various Software Packages To implement this project, NS2 simulator and NAM (network animator) have been used, and it s done on Linux platform. There are two languages in which the project was implemented Tcl (tool command language) and cpp. NS2 Simulator: NS2 simulator is a network simulator which plays a very crucial role in network research and development. The main advantage of this simulator is that it is open source software and available for everybody to use. With a scripting language like Tcl, one can configure his network 17

23 according to his architecture and check the way his network behaves with the help of this simulator. And with this one can calculate the network performance and work accordingly for better results. NS2 also offers default implementations for transport layer protocols like TCP and UDP. NAM-Network Animator: Nam is a network animator that is a part of Tcl tool-kit( Tcl/Tk). It helps by checking network simulation traces. These traces are considered as output for the network simulator 18

24 4. System Implementation Steps Involved in implementing this project: Configuring and creating nodes Dynamically selecting source and destination for data transmission Selecting relay nodes between source and destination Exchanging frames (ACK and NACK) Analyzing throughput 4.1 Configuring and Creating Nodes Before the process is implemented on an ad hoc network, a network is created with the specifications given, to implement the project on it through simulation. For that, a network is first configured and then created in Tcl. After the creation of the nodes, they are assigned positions in the network initially. The energy levels and other information of the nodes are updated throughout the process, as this information is required along with the distance between nodes and number of hops for selecting the cooperative node. All this information is updated in the trace file, every event in this process is updated in a trace file. That trace file is the output for this simulation. As it is difficult to understand the trace file, a network animator is used to show the output of the simulation. After the network is configured and created with the number of nodes given by the user. The Source and destination for transmitting data are selected (Figure 9). 19

25 4.2 Selecting Relay Nodes for Data Transmission Selecting relay nodes for data transmission is one of the main steps in this project, as this plays an important role in enhancing the overall performance of the network. Before selecting the relay nodes, parameters like: Energy, Distance and Number of hops are checked. Figure 9. Source, Destination and Relay Nodes Once the relay nodes are selected, the data transmission is started via the relay nodes. 20

26 4.3 Exchanging frames (ACK and NACK) After the nodes, source, destination and relay nodes are ready for the transmission, the source node will have to inspect the medium to see whether the channel is idle or not. If the carrier is not idle, it waits for the random backoff time. Or else it will be checking till the channel becomes idle. After which, the packet transmission starts, if a packet is corrupted the source gets a negative acknowledgment and the node will simply drop the packet. The source node will now transfer the packet through a relay node, without requiring the whole transmission to start again. In case the transmission is successful, the destination node will send ACK to the source and the source can now handle the next packet. 4.4 Analyzing throughput Throughput for the protocol is calculated considering the received packets. The received packets will be denoted by r in the trace file. Calculating number of received packets from the trace file and the control bit rate the throughput is calculated. The initial packet size and the final packet size are also considered in calculating the throughput. 21

27 5. Evaluation and Results 5.1 Testing Testing is very important for any project. It primarily focuses on whether the project is generating desired outputs or not in different scenarios, and helps the developer to make sure that the project is working fine in all possible scenarios that are in developing terms called test cases. This phase of the project is important due to number of reasons like if the user purchases the product developed and released without testing. There will be high probability that the product may not work fine in all cases. And so the user will finally not be satisfied and will have complaints about that product that is a negative sign for any growing software company. This type of cases will have a very bad impact on the company s sales. Customer or user satisfaction is the highest priority for any software developer. Therefore testing plays a very important role in software development. 5.2 Test Cases A test case deals with a scenario that can be used to test a functionality of a project in software engineering. It helps find out errors and is used to make sure if the output of the project is working as per the requirements of the project. This is the final phase of development, testing and debugging is done before the product is released into the market or before it is given to the user. However in this paper, testing the project will not be the same as normal software engineering projects as this paper implements a routing protocol in an ad hoc network using a network simulator for implementation. A network simulator mainly uses the position of the 22

28 nodes in defining how the network behaves. How the network behaves and how is the output consistent when the number of nodes is changed will be tested in the test cases in following sections. Test Case 1 Simulation Results with High Network Density: The number of nodes is set to 120 in this case. The source and destination nodes are selected to be 10 and 20 respectively [10]. Figure 10. Number of Nodes Set to

29 Then the neighboring nodes are analyzed to decide which neighboring nodes will become relay nodes for the transmission. Selecting the relay nodes for communication is done dynamically, based on the node information, number of hops and transmission time. To make the simulation clear, the source and destination nodes have been color-coded in one color and the relay nodes are color-coded in one color and the remaining nodes are color coded in a different color. As everything cannot be shown in a simulation environment, such as selecting the relay nodes, sending an acknowledgment and negative acknowledgment cannot be seen. However, every event is recorded in a trace file, this file can be referred for any particular event. After the simulation is successful. A network animator is used to display the simulation traces, as it is difficult for the user to read a trace file. The initial position of 120 nodes before the simulation starts is shown in Figure 11. Figure 11. Network Animator with 120 Nodes. 24

30 After the simulation is complete, one can see the simulation through the network animator to understand how the process is executed. As it can be seen in Figure 11, the network has 120 nodes and these nodes are spread to different positions as they were given positions in the network initially. And then the source and destination and the route through the relay nodes from source and destination are displayed in the network animator (Figure 12) (Figure 13), after which the data transmission starts (Figure 14). Figure 12. Source, Destination and Relay Nodes in a Network Animator (NAM). 25

31 Figure 13. Closer look at Source, Destination and Relay Nodes. As the simulation time progresses the relay nodes are selected based on the node characteristics before the data transmission is started, but before that direct transmission is checked. And then the data transmission starts (Figure 14). Figure 14. Data Transmission Starts. 26

32 Before selecting the relay nodes direct transmission is considered and checked because in a few cases direct transmission might be the best way to transmit data like in this test case. This case is very important because selecting the relay nodes and transmitting data when the direct transmission is the best way to transmit data might decrease the network performance as the simulation takes more time. And so it might not be a good option, not to check direct transmission before selecting relay nodes for data transmission. P a c k e t s Simulation Time Figure 15. Graphical Output for Throughput. 27

33 After the simulation is complete, based on the number of packets received a throughput graph is generated with simulation time on x axis and number of packets on the y axis. As it can be seen in Figure 15, initially the throughput is high because before the data transmission starts the nodes exchange node information. Then the throughput drops, because when the relay nodes are calculated there are no packets delivered. And then it again rises back when the data transmission starts. Test Case 2 Low Network Density (data transmission failed): The number of nodes is set to 5 in this case. The source and destination are selected to be 1 and 2 respectively (Figure 16). Figure 16. Number of nodes set to 5. 28

34 As it can be seen in Figure 16, user can give the input for number of nodes. The source and destination nodes are selected and then the nodes will be analyzed to decide, which neighboring nodes will become relay nodes for the transmission. Figure 17. Network Animator with 5 nodes. After the simulation is complete, one can see the simulation process using a network animator. As it can be seen in Figure 17, the network has 5 nodes. And these nodes are spread to different positions initially. And then the source and destination and the route through the relay nodes 29

35 from the source and destination are displayed in the network animator (Figure 18). After which the data transmission starts. In Ad hoc networks, it is very important for the nodes to be in the transmission range of each other. Communication without the nodes being in the transmission range is not possible. So network density plays a vital role in data transmission as far as ad hoc networks are concerned. When the number of nodes are less the chances of failed data transmissions are high as the network density will be low. As per the given network area, this protocol works fine for any input which is more than a 100. It also works for fewer nodes but the possibility of failed transmissions will be high. Figure 18. Source and Destination Nodes in a Network Animator (NAM). 30

36 As in this case there are no relay nodes because there are no neighboring nodes for the source node to start the data transmission(figure 18),the data transmission fails. P a c k e t s Simulation Time Figure 19. Graphical Output for Throughput. 31

37 A graph for throughput is generated for this test case. The x axis indicates the simulation time and the y axis indicates the number of packets. In the graph the throughput goes down when the relay nodes are calculated for data transmission and again goes down as there are no relay nodes to help the data transmission (Figure 19). Test case 3 low network density (successful data transmission): In this test case, the number of nodes is set to 75 (Figure 20).As the number of nodes are not too low, the chances of successful data transmission slightly improve compared to the test case 2. The source and destination nodes are selected to be 10 and 20 respectively. Figure 20. Number of Nodes Set to

38 As per the user s input for number of nodes the 120 nodes which have to form an ad hoc network are shown in the network animator (Figure 21). Figure Nodes in Network Animator. As it can be seen (Figure 22) the source and destination nodes are in one color and are labelled source node and destination node. The relay nodes are selected based on the node positions and their characteristics. These relay nodes are also color coded and are in a different color (Figure 23). After the relay nodes are dynamically selected, the data transmission starts. 33

39 Figure 22. Source, Destination and Relay Nodes in Network Animator-A. Figure 23. Source, Destination and Relay Nodes in Network Animator-B. 34

40 These are the test cases in which the project is tested. Whenever the number of nodes is less, the probability of successful data transmission decreases because of the network density. As the network density decreases the probability of mobile nodes to be available in the neighbor nodes data transmission range decreases, this means there will be no connectivity between those nodes until they move to the data transmission range of neighbor nodes. P a c k e t s Simulation Time Figure 24. Graphical output for Throughput. 35

41 After the simulation is complete, based on the number of packets received a throughput graph is generated with simulation time on the x-axis and number of packets on the y axis. As it can be seen in Figure 24, initially the throughput is high because before the data transmission starts the nodes exchange node information. Then the throughput drops, because when the relay nodes are calculated there are no packets delivered. And then it again rises back when the data transmission starts. Number Of Nodes Success Rate % % % 75 33% 50 0% 25 0% Figure 25. Success Rate. The trend in the success rate of data transmission is calculated and tabulated while varying network density (Figure 25). 36

42 6. Conclusion and Future Work In this paper, a unique cooperative MAC protocol is implemented, by taking advantage of the features of cooperative communication. A new approach for selecting relay nodes is also introduced in this paper. Firstly, the nodes in the network have been configured and created on which the protocol is to be tested and then the source and destination nodes which have to communicate are selected dynamically. After selecting the source and destination nodes for data transmission the neighbor nodes are analyzed to select the relay nodes to help the data transmission between source and destination nodes. But before analyzing the neighbor nodes the direct transmission is checked. If direct transmission is an efficient way of transferring data, selecting relay nodes is skipped else the relay nodes are selected based on their characteristics like energy, number of hops, distance. The data transmission starts after selecting the relay nodes. If the relay nodes in between fail or if there is link failure the source node gets a negative acknowledgement, and it selects a cooperative node to complete the data transmission. This is called pure co-operative retransmission. Once the packet reaches the destination node, it sends out acknowledgment to the source node and it serves the next packet in the queue. The standard collision avoidance methods have been followed for optimal performance of the network. The results show that the network performance was consistent under a few assumptions made for forming the network. However, there is still plenty of room for improvement. This protocol can be implemented for larger networks with more number of nodes and no network constraints. The mobility of the nodes can be increased, at the same time making sure that the network performance does not degrade. In this method, the mobility of the nodes is 37

43 minimized. The functionality where the input for source and destination nodes can be given by the user, can also be added. The general network traffic can also be introduced to make the evaluation of the network more realistic. 38

44 7. Bibliography and References [1] Li Yi; Ji Hong, A New Cooperative Communication MAC Strategy forwireless Ad Hoc Networks in Computer and Information Science, ICIS th IEEE/ACIS International Conference, [2] Yun Li; Zhenghua Zhang; Chonggang Wang; Weiliang Zhao; Hsiao-Hwa Chen, Blind Cooperative Communications for Multihop Ad HocWireless Networks Vehicular Technology, IEEE Transactions on Volume: 62, Issue: 7, [3] Eunsook Shim; Seunghoon Baek; Joungsik Kim; Dongkyun Kim, Multi-Channel Multi-Interface MAC Protocol in Wireless AdHoc Networks Communications, ICC '08. IEEE International Conference, [4] Hui-Hsin Chin; Chun-Cheng Lin; Der-Jiunn Deng, Contention resolution algorithm for MAC protocol in wirelessad-hoc networks, Wireless Communications and Mobile Computing Conference (IWCMC), th International, [5] [6] [7] [8] Xiaoyan Wang, Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks, Grad. Sch. of Syst. & Inf. Eng., Univ. of Tsukuba, Tsukuba, Japan, [9] 39

45 [10] [11] J&citation_for_view=0Brxa0QAAAAJ:u5HHmVD_uO8C [12] Khalid, Murad, Two-Relay-Based Cooperative MAC Protocol for Wireless Ad hoc Networks, Dept. of Electr. Eng., Univ. of South Florida, Tampa, FL, USA,

46 8. Appendix Source Code for Tcl(Tool Command Language) 41

47 42

48 43

49 44

50 45

51 46

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,

More information

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment N Charan 1, Dr. Sreerangaraju M.N 2, Nagesh R 3 P.G. Student, Department of Electronics & Communication

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks

A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks 212 7th International ICST Conference on Communications and Networking in China (CHINACOM) A MAC Protocol based on Dynamic Time Adjusting in Wireless MIMO Networks Yang Qin*, Xiaoxiong Zhong, Li Li, Zhenhua

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel

Ad Hoc b Cooperative Protocols: Performance in a Slow Fading Channel Ad Hoc 8.b Cooperative Protocols: Performance in a Slow Fading Channel Niraj Agarwal, Divya ChanneGowda, Lakshmi Narasimhan Kannan, Marco Tacca, Andrea Fumagalli Technical Report UTD/EE//7 March 7 Ad Hoc

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks

A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks A Quota Transfer Protocol for Upstream Transmissions in Wireless Mesh Networks Yen-Bin Lee and Wen-Shyang Hwang Department of Electrical Engineering, National Kaohsiung University of Applied Sciences,

More information

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs

Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Analysis of Broadcast Non-Saturation Throughput as a Performance Measure in VANETs Gayathri Narayanan Department of Electronics and Communication Engineering Amrita School of Engineering, Amritapuri Campus,

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks

Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Multi-channel MAC with Dynamic Channel Selection for Ad Hoc Networks Asis Nasipuri and Jai Mondhe Department of Electrical & Computer Engineering The University of North Carolina at Charlotte Charlotte,

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Md. Abdullah-Al-Mamun, M. Mahbubur Rahman Department of Information and Communication Engineering Islamic University Kushtia

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL

CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL CSMA/CA BASED AD-HOC NETWORK USING MAC PROTOCOL Er. Prabhnoor Bachhal 1, Er. Shivani Kwatra 2 1M.Tech(CSE Deptt) GGGI, Dinarpur, Ambala 1Assistant Professor (CSE Deptt), GGGI, Dinarpur Ambala -----------------------------------------------------------------------------------***-------------------------------------------------------------------------------

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University Wireless and WiFi Daniel Zappala CS 460 Computer Networking Brigham Young University Wireless Networks 2/28 mobile phone subscribers now outnumber wired phone subscribers similar trend likely with Internet

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

Efficient Power MAC Protocol in Ad-hoc Network s

Efficient Power MAC Protocol in Ad-hoc Network s Efficient Power MAC Protocol in Ad-hoc Network s Rahul Mukherjee HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv Gandhi

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless

More information

Novel Techniques for Fair Rate Control in Wireless Mesh Networks

Novel Techniques for Fair Rate Control in Wireless Mesh Networks Novel Techniques for Fair Rate Control in Wireless Mesh Networks Mohiuddin Ahmed Computer Science and Engineering Department Islamic University of Technology Gazipur, Bangladesh K.M.Arifur Rahman Electrical

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks

CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks CSMA/IC: A New Class of Collision free MAC Protocols for Ad Hoc Wireless Networks Tiantong You (you@cs.queensu.ca) Department of Computing and Information Science Chi-Hsiang Yeh (yeh@ece.queensu.ca) Department

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Performance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme

Performance Analysis of Distributed Mac Protocol with Physical Layer Network Coding Scheme World Engineering & Applied Sciences Journal 6 (2): 97-103, 2015 ISSN 2079-2204 IDOSI Publications, 2015 DOI: 10.5829/idosi.weasj.2015.6.2.22146 Performance Analysis of Distributed Mac Protocol with Physical

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks

A Measurement Study of Multiplicative Overhead Effects in Wireless Networks A Measurement Study of Multiplicative Overhead Effects in Wireless Joseph Camp, Vincenzo Mancuso, Omer Gurewitz, and Edward W. Knightly INFOCOM 2008 http://networks.rice.edu System: Large-scale, Multi-tier

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

MAC protocols. Lecturer: Dmitri A. Moltchanov

MAC protocols. Lecturer: Dmitri A. Moltchanov MAC protocols Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2616/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of MAC protocols Contention-based

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

Performance of DSDV Protocol over Sensor Networks

Performance of DSDV Protocol over Sensor Networks Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model.

November 1998 doc.: IEEE /378 IEEE P Wireless LANs Extension of Bluetooth and Direct Sequence Interference Model. IEEE P802.11 Wireless LANs Extension of Bluetooth and 802.11 Direct Sequence Interference Model Date: November 11, 1998 Author: Jim Zyren Harris Semiconductor Melbourne, FL, USA Phone: (407)729-4177 Fax:

More information

Civilizing the Network Lifetime Efficiently in MANETs Through DEL-CMAC Protocol

Civilizing the Network Lifetime Efficiently in MANETs Through DEL-CMAC Protocol Civilizing the Network Lifetime Efficiently in MANETs Through EL-CMAC Protocol K.Seetha PG Student: ept of Computer Science & Engineering Annamalai University Chidambaram, Tamil Nadu, India Ksv.seetha@gmail.com

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion ABSTRACT Communication is usually done through means of network where there is a lot of intrusion included to it. In order to detect the misbehavior, there should an effective strategy, which is capable

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

FSA: A Fast Coordination Scheme for Opportunistic Routing

FSA: A Fast Coordination Scheme for Opportunistic Routing F: A Fast Coordination Scheme for Opportunistic Routing Zhenyu Yang, Kai Zeng and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Worcester, MA 0609 {zyyang, kzeng, wjlou}@wpi.edu Abstract

More information