ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

Size: px
Start display at page:

Download "ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN"

Transcription

1 I J I T E ISSN: (1-2), 2012, pp ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering, Annamalai University, Chidambaram s: 1 rmkmanikandan@yahoo.co.uk; 2 arulmanirogith@gmail.com; 3 kskaucse@yahoo.co.in Abstract: In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of packets, and thus the analysis is performed in terms of outage probability. In our network model, packets belonging to specific transmitters arrive randomly in space and time according to a 3-D Poisson point process, and are then transmitted to their intended destinations using a fully-distributed MAC protocol. A packet transmission is considered successful if the received SINR is above a predefined threshold for the duration of the packet. Accurate bounds on the outage probabilities are derived as a function of the transmitter density, the number of back offs and retransmissions, and in the case of CSMA, also the sensing threshold. The analytical expressions are validated with simulation results. For continuous-time transmission, CSMA with receiver sensing (which involves adding a feedback channel to the conventional CSMA protocol) is shown to yield the best performance. The sensing threshold of CSMA is optimized. It is shown that introducing sensing for lower densities (i.e., in sparse networks) is not beneficial, while for higher densities (i.e., in dense networks), using an optimized sensing threshold provides significant gain. Keywords: Ad hoc networks, MAC protocols, outage probability, Poisson point process. 1. INTRODUCTION In multi hop wireless networks, it is important to efficiently utilize the network resources and provide fairness to competing data flows. These objectives require the cooperation of different network layers. The transport layer needs to inject the right amount of traffic into the network based on the congestion level, and the MAC layer needs to serve the traffic efficiently to achieve high throughput. Through a utility optimization framework, this problem can be naturally decomposed into congestion control at the transport layer and scheduling at the MAC layer. It turns out that MAC-layer scheduling is the bottleneck of the problem. In particular, it is not easy to achieve the maximal throughput through distributed scheduling, which in turn prevents full utilization of the wireless network. Scheduling is challenging since the conflicting relationships between different links can be complicated.in order to derive precise results, we focus exclusively on single-hop communication, as in [1], [2], [3]. All multiuser interference is treated as noise, and our model uses the SINR to evaluate the performance (in terms of OP) of the communication system. On the other hand, a number of lowcomplexity but suboptimal scheduling algorithms have been proposed in the literature. By using a distributed greedy protocol similar to IEEE , shows that only a fraction of the throughput region can be achieved. The fraction depends on the network topolog y and interference relationships. The algorithm is related to Maximal Scheduling, which chooses a maximal schedule among the nonempty queues in each slot. Different from Maximal Scheduling, the Longest- Queue-First (LQF) algorithm takes into account the queue lengths of the nonempty queues. It shows good throughput performance in simulations. In fact, LQF is proven to be throughput-optimal if the network topology satisfies a local pooling condition or if the network is small. In general topologies, however, LQF is not throughput-optimal, and the achievable fraction of the capacity region can be

2 20 R. Manikandan, K. Arulmani and K. Selvakumar characterized as in. Reference studied the impact of such imperfect scheduling on utility maximization in wireless networks. A number of researchers have analyzed slotted ALOHA using a Poisson model for TX locations, considering transmission capacity and success probability of the network [2], [4], [5]. Ferrari and Tonguz [6] have analyzed the transport capacity of slotted ALOHA and CSMA, showing that for low transmission densities the performance of slotted ALOHA is almost twice that of CSMA. We adopt the concept of guard zones in our analysis, with the difference that instead of incorporating into the protocol a guard zone within which no TX are permitted, we consider actual MAC protocols that employ virtual guard zones in order to make the backoff decision and evaluate the OP. Other analytical models m ay also be used for performance evaluation [18], [9]. In [10], the throughput of the CSMA protocol is evaluated in a multi-hop ad hoc network. 2. EXISTING WORK The main obstacles in extending the work to general resource allocation problems for multi hop wireless networks. The optimal scheduling component at the MAC layer is very complex, and thus needs simpler (potentially imperfect) distributed solutions. The drawback of this scheme is that it relies on the collection of information from the environment over a period of time, which entails high complexity and is not able to handle fast variations of the interference decomposed into congestion control at the transport layer and scheduling at the MAC layer Cross Layer Optimization The following cross-layer control algorithm is decoupled into separate algorithms for ûow control at the clients, power aware uplink/ downlink transmission scheduling, and routing in the mesh router nodes. The mesh clients are power constrained mobile nodes with relatively little knowledge of the overall network topology. The mesh routers are stationary wireless nodes with higher transmission rates and more capabilities. We develop a notion of instantaneous capacity regions, and construct algorithms for multi-hop routing and transmission scheduling that achieve network stability and fairness with respect to these regions Outage Probability of Aloha In ALOHA packets are transmitted to their intended RXs immediately upon their arrival, regardless of the channel conditions. Here the concept of guard zone[4] is used to analyze the outage probability. First, define s to be the distance between a randomly selected RX on the plane, RX0, and its closest interfering TX that causes the SINR to fall just below the threshold. By manipulation of the SINR expression, S is derived to be: S = (R - / / ) -1/ (1) 3. MODULE DESCRIPTIONS The modules which are implemented in this paper are given below Interference Data Model In multi hop wireless networks, it is important to efficiently utilize the network resources and provide fairness to competing data flows. These objectives require the cooperation of different network layers. The transport layer needs to inject the right amount of traffic into the network based on the congestion level, and the MAC layer needs to serve the traffic efficiently to achieve high throughput. Through a utility optimization framework, this problem can be naturally Figure 1: Guard Zone Fig. 1. When at least one interferer TX 1 falls within a distance s away from RX 0, i.e., inside B(RX 0, s), it causes for RX 0.

3 Enhancing the Performance of Manet through Mac Layer Design 21 Through Eq. (1), sens corresponds to ssens, req to sreq etc. The guard zone B(RX0, s) is a circle of radius s around RX0, as illustrated in Fig. 1. One situation that would cause RX0 to go into outage is if the accumulation of powers from all the interfering nodes outside B(RX0, s) results in the SINR at RX0 falling below the threshold. Another situation is if at least one active TX, other than RX0 s own TX, TX0, falls inside B(RX0, s) at any time during the packet transmission. Considering only the latter event yields a lower bound to the OP. It has previously been shown that this lower bound is in fact fairly tight around the actual OP [5], and hence, we only focus on this bound in our analysis. Given the probability of a packet being retransmitted in ALOHA is Prt, the density of packets on the plane at each time instant is aloha(p rt ) = (1 + P rt + P 2 rt + +PN rt ) = (1-p rt N+1 /1 p rt ) (2) Applying the concept of guard zones in our ad hoc network with spatial node density of aloha(p rt ), we shall now derive the OP of slotted and unslotted ALOHA in the following. (A) Slotted Aloha In a slotted system, the time line is divided into slots of fixed duration T, and TXs can only start their transmissions at the beginning of the next time slot after each packet has been formed. In this there is no partial overlap of packets. In slotted system we consider the locations of packet arrivals in each slot, which follow a homogeneous 2-D ppp. (B) Unslotted Aloha In unslotted ALOHA, communication is continuous in time, the packets are transmitted as soon as they are formed. Unslotted protocols are particularly of interest in system that has no synchronization abilities. We expect the outage probability of unslotted ALOHA to exceed that of the slotted case, due to the partial overlap of transmissions CSMA (Carrier Sense Multiple Access) We introduce an adaptive carrier sense multiple access (CSMA) scheduling algorithm that can achieve the maximal throughput distributive. Some of the major advantages of the algorithm are that it applies to a very general interference model and that it is simple, distributed, and asynchronous. The algorithm is combined with congestion control to achieve the optimal utility and fairness of competing flows. It is inspired by CSMA, but may be applied to more general resource sharing problems (i.e., not limited to wireless networks). We show that if packet collisions are ig nored (as in s ome of the mentioned references), the algorithm can achieve maximal throughput. The algorithm may not be directly comparable to those throughput-optimal algorithms we have mentioned since it utilizes the carrier-sensing capability Congestion Control Now, we combine congestion control with the CSMA scheduling algorithm to achieve fairness among competing flows as well as the maximal throughput. Here, the input rates are distributed adjusted by the source of each flow. In multi hop wireless networks, designing distributed scheduling algorithms to achieve the maximal throughput is a challenging problem because of the complex interference constraints among different links. Traditional maximal-weight scheduling ( MWS), although throughputoptimal, is difficult to implement in distributed networks. It is well known that maximal-weight scheduling (MWS) is throughput-optimal. That is, that scheduling can support any incoming rates within the capacity region. A simple way to reduce the delay is by using joint CSMA scheduling and congestion control Performance Analysis Extensive simulation results of the proposed MAC protocol along with ALOHA and CSMA. In the simulations, the source nodes always have data packets to send and the following performance metrics are evaluated. End-to-end delay Packet delivery ratio Throughput Flow rate comparison Performance of SINR outage probability

4 22 R. Manikandan, K. Arulmani and K. Selvakumar Performance of SINR outage probability ratio Finally, MAC can significantly improve the performance of throughput, packet delivery ratio, end-to-end delay, performance of SINR outage probability and flow rate comparison compared to ALOHA and CSMA. 4. SIMULATION RESULTS Figure 3: Packet Delivery Ratio Figure 2: End-to-end Delay Fig. 2 explains End-to-end delays with respect to time. The time it takes for a packet to reach the destination is end-to-end delay. It includes all possible delays in the source and each intermediate host, caused by routing discovery, queuing at the interface queue, transmission at the MAC layers, etc. only successfully delivered packets are counted. Fig. 3 explains Packet delivery ratios with respect to time. The ratios of packet delivered to the destinations to the packet send out by the sources are shown in the figure. Fig. 4 explains Throughput of MAC with respect to time. The amount of packets moved successfully from one place to another in a given time period are shown in the figure. Fig. 5 explains Performance of SINR with respect to outage probability. The outage probability of unslotted ALOHA and CSMA as a function of normalized sensing threshold is shown. The outage probability of ALOHA Figure 4: Figure 5: Throughput of MAC Performance of SINR

5 Enhancing the Performance of Manet through Mac Layer Design 23 remains almost constant but in CSMA it varies. The outage probability of CSMA is lower. So CSMA has better performance of SINR value when compared to ALOHA. 5. CONCLUSION In this paper the performance of ALOHA and CSMA protocols in terms of outage probability with respect to packet delivery ratio, end-to-end delay, throughput, performance of SINR outage probability and flow rate comparison are presented. By finding those values maximal throughput can be achieved and the delay can be reduced. The outage probability of ALOHA remains almost constant but in CSMA it varies. The outage probability of CSMA is lower. So CSMA has better performance of SINR value when compared to ALOHA. Other possible extensions are to apply adaptive rate and power control to improve the performance of CSMA in wireless ad hoc networks. References Figure 6: Performance of SINR Threshold Fig. 6 explains Performance of SINR threshold with respect to outage probability ratio. Ratio of the outage probability of unslotted ALOHA and CSMA over that of slotted ALOHA as a function of SINR threshold. Figure 7: Flow Rate Comparison Fig. 7 explains Flow rate comparison of ALOHA and CSMA. Comparison of the flow rate between ALOHA and CSMA is shown in this graph. [1] M. Kaynia and N. Jindal, Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks, in Proc. IEEE International Conf. on Communications (ICC), , Beijing, China, May [2] M. Haenggi, Outage, Local Throughput, and Capacity of Random Wireless Networks, IEEE Trans. Wireless Commun., 8, , [3] N. Jindal, J. Andrews, and S. Weber, Optimizing the SINR Operating Point of Spatial Networks, in Proc. Workshop on Info. Theory and its Applications, San Diego, CA, Jan [4] A. Hasan and J. G. Andrews, The Guard Zone in Wireless Ad hoc Networks, IEEE Trans. Wireless Commun., 6(3), , [5] S. P. Weber, X. Yang, J. G. Andrews, and G. de Veciana, Transmission Capacity of Wireless Ad hoc Networks with Outage Constraints, IEEE Trans. Inf. Theory, 51(12), , [6] G. Ferrari and O. Tonguz, MAC Protocols and Transport Capacity in Ad hoc Wireless Networks: Aloha versus PR-CSMA, in Proc. IEEE Military Communications Conf., Boston, USA, 2, , [7] R. Vaze, Throughput-delay-reliability tradeoff with ARQ in Wireless Ad hoc Networks, available on /arxiv.org/abs/ , Apr [8] X. Wang and K. Kar, Throughput Modeling and Fairness Issues in CSMA/CA based Ad-hoc Networks, in Proc. INFOCOM, Miami, FL, Mar [9] M. Garetto, T. Salonidis, and E. Knightly, Modeling Per-flow throughput and Capturing Starvation in CSMA Multi-hop Wireless Networks, in Proc. INFOCOM, Barcelona, Spain, Apr [10] P. Muhlethaler and A. Najid, Throughput Optimization in Multihop CSMA Mobile Ad hoc Networks, in Proc. European Wireless Conf., 2004.

6 24 R. Manikandan, K. Arulmani and K. Selvakumar [11] B. J. B. Fonseca, A Distributed Procedure for Carrier Sensing Threshold Adaptation in CSMA-based Mobile ad hoc networks, in Proc. Vehicular Technology Conf. (VTC), pp , Baltimore, MD, Oct [12] M. Kaynia, G. E. Qien, and N. Jindal, Impact of Fading on the Performance of ALOHA and CSMA, in Proc. IEEE International Workshop on Signal Processing Advances for Wireless Communications (SPAWC), , 2009.

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 125-132 International Research Publications House http://www. ripublication.com A Distributed

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

The War Between Mice and Elephants

The War Between Mice and Elephants The War Between Mice and Elephants Liang Guo and Ibrahim Matta Computer Science Department Boston University 9th IEEE International Conference on Network Protocols (ICNP),, Riverside, CA, November 2001.

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

ENERGY OPTIMIZATION AND THROUGHPUT MAXIMIZATION USING MAC- LAYER DESIGN IN MANET

ENERGY OPTIMIZATION AND THROUGHPUT MAXIMIZATION USING MAC- LAYER DESIGN IN MANET Journal of Computer Networking, Wireless and Mobile Communications (JCNWMC) ISSN Applied Vol. 3 Issue 2, Jun 2013, 11-16 TJPRC Pvt. Ltd. ENERGY OPTIMIZATION AND THROUGHPUT MAXIMIZATION USING MAC- LAYER

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

CHAPTER 4 CROSS LAYER INTERACTION

CHAPTER 4 CROSS LAYER INTERACTION 38 CHAPTER 4 CROSS LAYER INTERACTION The cross layer interaction techniques used in the lower layers of the protocol stack, solve the hidden and exposed terminal problems of wireless and ad hoc networks.

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 3751 An Upper Bound on Multihop Transmission Capacity With Dynamic Routing Selection Yuxin Chen, Student Member, IEEE, and Jeffrey G Andrews,

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 1, Number 1, 2015 Pages 45-54 Jordan Journal of Electrical Engineering ISSN (Print): 2409-9600, ISSN (Online): 2409-9619 Performance Evaluation for Large Scale Star Topology IEEE 802.15.4 Based

More information

Cooperative-Diversity Slotted ALOHA

Cooperative-Diversity Slotted ALOHA Wireless Networks manuscript No. (will be inserted by the editor) Cooperative-Diversity Slotted ALOHA John M. Shea, Tan F. Wong, and Wing-Hin Wong Wireless Information Networking Group, University of Florida,

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Longest edge routing on the spatial Aloha graph

Longest edge routing on the spatial Aloha graph 1 Longest edge routing on the spatial Aloha graph Steven Weber, Nihar Jindal, Radha Krishna Ganti, Martin Haenggi Drexel University, Dept. of ECE, Philadelphia, PA 1914 University of Minnesota, Dept. of

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Quality of Experience in Dense CSMA Networks

Quality of Experience in Dense CSMA Networks IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) Quality of Experience in Dense CSMA Networks Tung-En Wu, Der-Jiunn Deng, and Kwang-Cheng

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone

NMA Radio Networks Network Level: Medium Access Control Roberto Verdone NMA Radio Networks Network Level: Medium Access Control Roberto Verdone Outline 1. Introduction 2. Fundamentals of Random MAC Aloha in Compact Networks Slotted Aloha in Compact Networks CSMA in Compact

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

System Wide Average interruption of Packet Using forecast policy in Wireless System

System Wide Average interruption of Packet Using forecast policy in Wireless System System Wide Average interruption of Packet Using forecast policy in Wireless System Veerraju Gampala, Department of Computer Science and Engineering, GMR Institute of Technology, Rajam, Andhra Pradesh,

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

On the Interdependence of Congestion and Contention in Wireless Sensor Networks On the Interdependence of Congestion and Contention in Wireless Sensor Networks Mehmet C. Vuran Vehbi C. Gungor School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

MAC Layer Performance of ITS G5

MAC Layer Performance of ITS G5 MAC Layer Performance of ITS G5 Optimized DCC and Advanced Transmitter Coordination 4 th ETSI TC ITS Workshop Doha, February 7-9, 2012 Marc Werner, Radu Lupoaie, Sundar Subramanian, Jubin Jose mwerner@qualcomm.com

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

WIRELESS relays are commonly used to extend the coverage

WIRELESS relays are commonly used to extend the coverage On Capacity of Relay-Assisted Communication Ashutosh Sabharwal Department of Electrical and Computer Engineering Rice University, Houston TX 77. Abstract In this paper, we study communication in wireless

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

ELEC 537: COMMUNICATION NETWORKS, PROJECT REPORT, FALL

ELEC 537: COMMUNICATION NETWORKS, PROJECT REPORT, FALL ELEC 537: COMMUNICATION NETWORKS, PROJECT REPORT, FALL 2009 1 Performance Evaluation of a Distributed CSMA Algorithm for Throughput and Utility Maximization Internal Report - Work in progress Lei Cao,

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Co-existence of WiFi and ZigBee

Co-existence of WiFi and ZigBee Co-existence of WiFi and ZigBee Kang G. Shin The University of Michigan Joint work with Xinyu Zhang ACM MobiHoc 2011 Applying Autonomics to Create an Intelligent, Ubiquitous Environment Slide 1 Coexistence

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks

A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks A Channel Accessing Scheme with Joint Detection Receivers in Ad Hoc Networks Sumeeth Nagaraj, Christian Schlegel High Capacity Digital Communications Lab University of Alberta, Canada. e-mail: {snagaraj,schlegel}@ece.ualberta.ca

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Abstract. 1. Introduction

Abstract. 1. Introduction PERFORMANCE MODELING OF HYBRID SATELLITE/WIRELESS NETWORKS USING FIXED POINT APPROXIMATION AND SENSITIVITY ANALYSIS OF THE PERFORMANCE MODELS FOR NETWORK DESIGN Ayan Roy-Chowdhury, Electrical and Computer

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.

COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks

A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks A Medium Access Control Protocol with Retransmission using NACK and Directional Antennas for Broadcasting in Wireless Ad-Hoc Networks Yoriko Utsunomiya, Michito Takahashi, Masaki Bandai, and Iwao Sasase

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

QoS Performance Management in Mixed Wireless Networks

QoS Performance Management in Mixed Wireless Networks QoS Performance Management in Mixed Wireless Networks Dr. Yacob Astatke Department of Electrical and Computer Engineering Morgan State University Dr. Richard Dean Faculty Advisor ABSTRACT This paper presents

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks

IEEE/ACM TRANSACTIONS ON NETWORKING 1. On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks IEEE/ACM TRANSACTIONS ON NETWORKING 1 On the Efficiency of CSMA-CA Scheduling in Wireless Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member, IEEE Abstract This paper

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Title: [Simulation Results for Final Proposal 15-3-0380] Date Submitted: [Aug 2013] Source: [Hongkun Li, Zhuo Chen, Chonggang

More information

Efficient Power Management in Wireless Communication

Efficient Power Management in Wireless Communication Efficient Power Management in Wireless Communication R.Saranya 1, Mrs.J.Meena 2 M.E student,, Department of ECE, P.S.R.College of Engineering, sivakasi, Tamilnadu, India 1 Assistant professor, Department

More information

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member,

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs

CARA: Collision-Aware Rate Adaptation for IEEE WLANs : Collision-Aware Rate Adaptation for IEEE 802.11 WLANs J.Kim, S. Kim, S. Choi and D.Qiao INFOCOM 2006 Barcelona, Spain Presenter - Bob Kinicki Advanced Computer Networks Fall 2007 Background Related Work

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

RECENTLY, there has been extensive research towards understanding

RECENTLY, there has been extensive research towards understanding IEEE/ACM TRANSACTIONS ON NETWORKING 1 Inducing Multiscale Clustering Using Multistage MAC Contention in CDMA Ad Hoc Networks Xiangying Yang, Member, IEEE, and Gustavo de Veciana, Senior Member, IEEE Abstract

More information

Distributed Call Admission Control for Ad Hoc Networks

Distributed Call Admission Control for Ad Hoc Networks Distributed Call Admission Control for Ad Hoc Networks Shahrokh Valaee and Baochun Li Abstract This paper introduces a distributed call admission controller for ad hod networks. The call admission controller

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 1 M.Tech in CSE Dept, 2 Associate Professor Abstract: In this paper a multi-hop

More information

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment

Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment Performance evaluation of Cooperative MAC and ZRP in Cooperative Communication Networking Environment N Charan 1, Dr. Sreerangaraju M.N 2, Nagesh R 3 P.G. Student, Department of Electronics & Communication

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER 32 CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER This proposed work describes the techniques used in the data link layer to improve the performance of the TCP in wireless networks and MANETs. In the data link

More information