Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks"

Transcription

1 Performance Evaluation of Failed Link Detection in Mobile Ad Hoc Networks Dimitri Marandin Chair for Telecommunications, Electrical Engineering Department Technical University of Dresden, Dresden, Germany Abstract Many ad hoc routing protocols need to determine link failures in the network. For that they keep track of the "next hop" nodes, which are used as next relay points in the routes. Hence the node must be able to recognize the case when a link to a next hop is failed. Most ad hoc routing protocols may detect broken links using hello messages or feedback provided to the protocol by the Medium Access Control(MAC) layer. While MAC feedback works better than hello messages at low network load we identified that if the traffic load on the network is high, the amount of incorrect link failure decisions from the MAC layer feedback also dramatically increases resulting in lower throughput. In this paper we address advantages and drawbacks of both approaches and investigated the delay of MAC feedback approach. I. INTRODUCTION Wireless ad hoc networks [1,2,3] are used where a stationary communication infrastructure is lacking and is expensive or infeasible to deploy (e.g. disaster relief efforts, battlefield, etc.). The military applications are still the main applications of ad-hoc networks, although there is a trend to apply ad hoc networks also for commercial uses because of their unique properties. Due to power limitation each station has a fixed range. It also acts as a router, relaying data packets for other stations to their final destination. One of the main challenges in the design of these networks is the routing mechanism. [4] upon a dynamically changing topology, node power constraints and the properties of the wireless channel. In recent years wireless ad hoc radio network have received a tremendous amount of attention from researchers. 398 IEEE WLAN[5] with access points became omnipresent. These networks are well suited for a variety of traffic types, including multimedia. One of major problem of infrastructure-based networks is the complex deployment and configuration of these networks. Ad hoc networking is not subject to these constraints. Numerous ad hoc routing protocols need to determine link failures in the network. In this paper an implementation of the Ad hoc On-Demand Distance Vector (AODV) routing protocol [6] is utilized to determine the effectiveness of link failure detection. The AODV Routing protocol is used as a representative of on-demand routing protocols meaning that it builds routes between nodes only as desired by source nodes. AODV keeps a routing table on each station in the ad hoc network. When a station tries to transmit a data packet to a destination node for which the route is not known, it uses a route request / route reply query cycle to find a route. Route discovery works by flooding the network with route request (RREQ) packets. At the time RREQ is forwarded routing table entries (reverse path entries) are created pointing back to the source. Each node receiving a RREQ, re-broadcasts it, unless it is either the destination or it has a route to the destination. Such a node unicasts the RREQ with a route reply (RREP) packet that is routed back to the original source. Routing table entries created at the time RREQ was forwarded are used to route the RREP to the source. The reverse path entries are expired after a short period of time. As the RREP propagates back to the source, nodes create forward path entries pointing to the destination. Once the source node receives the RREP, it may begin to send data packets to the destination. If any link on a route is failed, the source will be informed by a route error (RERR) packet. The source

2 and any intermediate node on the route of the RERR packet delete the broken route from their routing tables. The RERR propagation works in the following manner. A set of predecessor nodes is kept for each routing entry on every node. It points to the set of neighbouring nodes that use that routing entry to route packets. These nodes are informed with RERR packets when the next hop link breaks. Each predecessor node forwards the RERR to its own predecessors, so effectively removing all routes using the failed link. A routing table entry is expired if not used recently. Only useful routes are maintained to keep routing overheads low. AODV also uses a sequence number-method to determine actuality of routing table entries. It also help to guarantee loopfree work of the protocol. More details of AODV can be found in [6]. Many ad hoc routing protocols (for example, AODV, one of the most popular) keep track of the next hop nodes that are used as next relay points in the routes. Hence the node must be able to recognize the case when a link to a next hop is failed. Routing effectiveness and therefore link failure detection is key problem in mobile ad hoc networks. The rest of the paper is organized as follows. In section 2 two approaches of failed link detection in ad hoc routing are presented: messages and MAC layer feedback. To gain a better insight into MAC layer feedback section 3 gives the short overview of IEEE MAC DCF. Section 4 presents a performance evaluation and the discussion of simulation results when comparing MAC layer feedback and hello messaging. Finally section 5 concludes the paper and outlines some questions for further research. II. DETECTION OF FAILED LINKS IN AD HOC NETWORKS Ad hoc routing protocols may detect broken links using 1) hello messages, 2) feedback provided to the protocol by the MAC layer and 3) passive acknowledgements 1) messages The reason of using hello messages to determine link existence come from the assumption that receiving of a hello message signifies link availability with the source of the hello. This method works well on wired networks, which suffer from few packet losses and topology changes. In order to keep up routes, AODV usually demands that each node transmits a hello message at regular intervals (if the node has not broadcasted any other control messages during the previous second), with a default rate of e.g. once per second. Inability to receive three successive hello messages from a neighbour is interpreted as a sign that the link to the given neighbour is failed. When AODV is run over IEEE , messages do not need to be used due to the MAC layer feedback of unreachable next hops. When combined with the other MAC protocols, however, messages are needed since such feedback is not available. Many current implementations of routing protocols rely on hello messages. 2) MAC Feedback Alternatively, the AODV standard proposes that a station may use MAC layer methods to find out link failures to neighbouring nodes. This approach gives the routing protocol the possibility to quickly find broken links. MAC layer feedback are callbacks to the network layer sent by the MAC layer explicitly declaring a transmission error indicating that a packet could not be forwarded to its next hop node. 3) passive acknowledgements[11] If MAC layer feedback is not available, DSR specifies other approach, known as passive acknowledgments, in which a node, after a packet transmission to the next hop on the route, continues to listen the channel and overhears whether the next hop forwards the packet further along the path. If it doesn t hear the forwarding of the packet during predefined time, it draws a conclusion about link failure. The mechanism of passive acknowledgments suffers from the fact that it requires from WLAN network cards a support of promiscuous mode, which is extremely energy-expensive. Ericsson Simulation Work[10] showed that a low power devices such as Bluetooth consume roughly 50% more energy as the receiver would frequently need to decode all packets besides its own packets. As passive acknowledgements didn t find wide application in ad hoc networks research from aforementioned reasons, we restrict our focus in this paper on most used approaches: hello messages and MAC feedback. 399

3 Fig 1. MAC Feedback delay In this paper we addressed advantages and drawbacks of both approaches. We also investigated the delay of MAC feedback approach. Although large number of papers have performed simulations using one of the mechanisms, no papers, as far as we know, clearly compare them in terms of detection delay, energy consumption, impact on network throughput. [7] examined the effectiveness of hello messaging for monitoring link status. In this study, it is concluded that many parameters influence the utility of hello messages. The authors examine these factors and experimentally evaluate a variety of approaches for improving the accuracy of hello messages as an indicator of local connectivity. [8] simulated ad hoc routing protocols when run over different MAC protocols. It was determined that the choice of MAC layer protocol affects the relative performance of the routing protocols. Because some routing protocols require periodic hello messaging when run over link layer protocols that do not provide MAC feedback when the next hop is unreachable, the amount of control traffic generated with other MAC protocols is considerably greater than with IEEE DCF III. IEEE MAC MAC FEEDBACK In a typical ad hoc wireless network mobile stations use omni-directional antennas, so the channel is to be shared by nearby situated stations. The sharing of this channel is managed by the IEEE Medium Access Control (MAC) protocol. The IEEE MAC layer may operate in two different channel access mechanisms: the point coordination function (PCF) and distributed coordination function (DCF). The distributed coordination function (DCF) of IEEE became practically the standard MAC protocol for ad hoc networking and is now in use in almost all simulations and testbeds for wireless multihop ad hoc network investigation. As the PCF cannot be utilized in ad hoc networks further we consider only the DCF. The DCF is in essence a carrier sense multiple access with collision avoidance (CSMA/CA) and includes the use of RTS/CTS mechanism. The CSMA/CA protocol manages access to the wireless medium, to avoid messages getting lost due to frame collisions. This method is actually inherited from Ethernet (CSMA/CD) and is based on packet contention. A CSMA/CA referred to as the Physical Carrier sense operates as follows: When a node receives a packet to be sent from the higher layer, it listens from the beginning to ensure that no other nodes are transmitting. If the channel is idle for a period of time equal to a distributed interframe space (DIFS), then the station may transmit the packet. Else, it defers its transmission by selecting a random "backoff" period which determines the interval of time the node must wait until it is permitted to attempt to retransmit its packet. During periods in which the channel is sensed as idle, the transmitting node decrements its backoff counter. When the channel is busy, backoff counter is frozen. When the backoff counter runs down to zero, the node is allowed to retransmit the packet. As the probability that two nodes will select the same backoff period is small, collisions between packets are minimized. But there is always a possibility that some stations can sense channel as idle at once and transmit at the same time, invoking a collision. Collision detection, as is used in Ethernet, cannot be employed for the radio transmissions of IEEE The cause for this is that when a node is transmitting it cannot hear any other nodes in the network which may be transmitting, since its own signal will suppress any others reaching at the node. To prevail over the collisions (or at least to perform a fast collision detection) and resolve well known hidden terminal problem, which occurs 400

4 Goodput Energy efficiency Overall recieved packets MAC feedback Energy, Joules 0,08 0,07 0,06 0,05 0,04 0,03 0,02 0,01 0 MAC Feedback Fig. 2. Goodput with different link failure detection approaches for static network Fig. 3. Energy consumption per received packet with different link failure detection approaches for static network often in ad hoc networks the RTS/CTS dialogue was developed. Before actual data transmission can take place, RTS and CTS handshaking packets are used to reserve the channel. The station, that has a data packet to send, first transmits a Request To Send (RTS) control frame to the intended receiver of the data packet. If the intended receiver hears the RTS, it responds with a short clear-to-send (CTS) packet after a period of time called Short Interframe Space(SIFS). Any other stations hearing either of both packets must be silent and defer transmission by setting Network Allocation Vector (NAV) an internal structure that records when the channel might be free. Using the NAV a station knows when the current transmission ends. The use of NAV is referred to as the Virtual Carrier sense. The transmitting station is allowed to transmit its data packet only if the CTS frame is properly received. Since the CSMA/CA can not detect a collision, the acknowledgment ACK for data packet is transmitted after SIFS interval. After 7 (according to IEEE ) RTS retransmissions have failed MAC sends the routing protocol a message that the link is failed. So the delay of MAC feedback to detect link failure consists of following parts: - waiting a random backoff time after the last packet transmission, as the node must wait between two consecutive transmission - DIFS period before sending RTS - DIFS period for waiting CTS - backoff time between RTS retransmissions As the backoff timer is frozen if the channel is busy, backoff waiting time can be large in networks with high load. IV. EEE MAC MAC FEEDBACK PERFORMANCE EVALUATION We did several simulations using Network Simulator (NS-2)[9] for different link failure detection approaches (hello messages, MAC feedback). The radio interface of nodes was based on Lucent s WaveLan with 250m of propagation range. Nodes used omni-directional antennas. We used the following network configuration. The network size was fixed to 50 nodes located in a 670mx670m square. They use a two-ray ground propagation model and a random-way point model as the mobility model. In this model, nodes choose a random destination point and a speed value from uniform distribution between 0 and 20m/s. When they reach their destination, the mobility model is repeated. The IEEE MAC protocol with Distributed Coordination Function (DCF) is used as the MAC layer in the experiments. A traffic load was generated to simulate constant bit rate sources. 5, 10, 15, 20, 25, 30, 35 data sessions with randomly selected sources and destinations are simulated. Each node transmits data packets at a rate of four packets/sec. The size of data payload was 512 bytes.. The total simulation run time lasted 900 seconds with a warm up period

5 Goodput Energy efficiency Overall received packets MAC Feedback Energy, Joules 0,07 0,068 0,066 0,064 0,062 0,06 0,058 0,056 0,054 0,052 MAC Feedback Fig. 4. Goodput with different link failure detection approaches for mobile network seconds. All communication flows started during first 200 seconds. Results presented are an average of 10 runs (excluding warm-up period). We concentrated on two performance metrics in simulation: goodput and energy efficiency. Goodput denotes the number of packets that is correctly received. It is in essence proportional to throughput. The energy efficiency of packet transmissions refers to the ratio of the total consumed energy of all nodes to the total number of successfully received packets at the destinations. It is often essential to optimise energy expenditure in a mobile ad hoc network. Last one being to estimate overhead cost in the network. Simulations involving the measurement of goodput of the connections gave the following results about the relative performance achieved with hello messages and MAC layer feedback. As shown in figure 2 both detection methods provide similar goodput if the number of CBR connections is low or moderate in the static ad hoc network. But if the traffic load in the network increases, hello messages predominate MAC feedback as the number of incorrect link failure decisions of MAC Feedback increases. The average of energy expenditure per received packet has an opposite trend (see figure 3), as 1) with moderate traffic the MAC feedback approach detects link failure very well without energy consumption related to broadcasting of hello messages 2) with heavy traffic load an energy consumption for overhead burden increases due to many incorrect link failure detection decisions. In mobile networks MAC feedback shows better performance than the hello messages (see figure 4). Fig. 5. Energy consumption per received packet with different link failure detection approaches for mobile network But if the network load grows its goodput decreases then energy consumed per received packet (overhead) increases (see figure 5). It is interesting to note from comparison of figures 2 and 4 that in term of network goodput, hello messages are optimal for a static network, while the MAC feedback is better for a mobile network. MAC layer has to perform multiple RTS transmissions before it can conclude anything about the link failure. It results in significant delay between the occurrence of link failure and its determination (see figures 6 and 7). This detection time increases with increasing load in the network as 1) the number of retransmissions increases 2) the backoff timer is frozen for long time. If the load is low or moderate then MAC Feedback provides quick link failure detection, where as periodic hello messages at the routing layer are more quick and robust in overloaded networks. We investigated the delay of route failure detection with MAC feedback and we found out that it is normally less than delay with hello messages (3 seconds) but in some rare cases it can achieve 9 seconds (see figure 6) in mobile networks with high load. Figure 7 shows the delay in dependence on the sum of number of active neighbour stations and the number of active hidden stations relative transmitter of RTS. An active neighbour station is a station which is located in the range of the transmitter of RTS and has a packet to transmit. An active hidden station is a station in the range of intended receiver of RTS which is not in the range of transmitter of RTS and has a packet to transmit. The number of active 402

6 pdf Fig. 6. Complimentary CDF of delay of route failure detection with MAC feedback from number of CBR connections hidden stations has also an impact on MAC feedback delay. If this number is large than the probability increases that the receiver of RTS can not answer with CTS due to virtual carrier sense. It results in a setting of backoff timer on the transmitter of RTS and a necessity of new retransmission. Both will increase the MAC feedback delay. For example, the delay is significantly larger with 15 active neighbouring and hidden nodes in comparison with 2 or 5 (see figure 7). V. CONCLUSIONS Ad hoc routing protocols may detect broken links using hello messages, feedback provided to the protocol by the MAC layer or passive acknowledgements. As passive acknowledgements didn t find wide application in ad hoc networks research, we addressed advantages and drawbacks of first two approaches in this paper. While MAC feedback works better than hello messages with small network load we identified that if the traffic load on the network is high, the amount of incorrect decisions about link failures that the MAC layer make also dramatically increases that results in lower throughput. The revealing link failures based on MAC layer feedback may not be reliable if the traffic in the network increases. The reason for this behaviour is that IEEE DCF, used in our simulation, increases the amount of RTS collisions as the traffic load increases. The collisions are so frequent that the MAC layer (after 7 RTS retransmission according to IEEE ) sends incorrect feedback to the routing protocol, a sign that initiates AODV to send a Route 403 Fig. 7. Delay of route failure detection with MAC feedback from sum of active neighbours and hidden terminals Error to the source. In that way the source node then floods a network with Route Request control packet. As the traffic load on the network grows, the amount of incorrect decisions about link failures that the MAC layer reports also dramatically increases. This increments the amount of Route Requests being broadcasted on the network and induces additional overhead. We have discovered that most of the collisions, occurred due to virtual carrier sense, happen in this scenario: the sender transmits RTS to next hop neighbour, but it could not answer with CTS as its NAV was set. So many incorrect decisions about link failures are made as the intended receiver of RTS couldn t transmit CTS back due to NAV, but in the reality the link exists. The MAC feedback method reduces the overhead of the regular hello messages (figures 5 and 7), but partly modifies the protocol; for instance, all link failure detection in AODV is solely on-demand, and from that a failed link cannot be recognized until a packet has to be sent over the link. In contrary, using the periodic hello messages in standard AODV allows failed links to be detected before a packet is sent to the next hop. But as AODV needs periodic broadcasting when run over MAC layer protocols that do not provide feedback about the presence of the next hop, the consumed energy and the volume of control traffic caused with these MAC protocols are significantly greater than when it is run over MAC IEEE

7 REFERENCES [1] I. Chlamatac, M. Conti, and J. Liu "Mobile Ad Hoc Networking: Imperatives and Challenges"; Ad Hoc Networks 1 (2003) [2] Borriello G, "Key challenges in communication for ubiquitous computing"; IEEE Communications Magazine 40(5):16-18, [3] R.Ramanathan, J. Redi "A brief overview of ad hoc networks - challenges and directions", IEEE Communications Magazine 40(5):20-22, [4] John Novatnack, Lloyd Greenwald and Harpreet Arora "Impact of ad hoc routing protocols on pervasive computing" Under review for IEEE/PerCom 2004, Second IEEE International Conference on Pervasive Computing and Communications, Orlando, Florida, March [5] IEEE Standard for Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications, P [6] C. E. Perkins and E. M. Royer, Ad-Hoc On-Demand Distance Vector Routing, Proceeding of the IEEE workshop on Mobile Computing Systems and Applications, page , February available from Oct 1996 [7] Ian D. Chakeres and Elizabeth M. Belding-Royer. "The Utility of Messages for Determining Link Connectivity." Proceedings of the 5th International Symposium on Wireless Personal Multimedia Communications (WPMC) 2002, Honolulu, Hawaii, October 2002, pp [8] Elizabeth M. Royer, Sung-Ju Lee and Charles E. Perkins. "The Effects of MAC Protocols on Ad hoc Network Communications." Proceedings of the IEEE Wireless Communications and Networking Conference, Chicago, IL, September [9] "ns-2 Network Simulator", Obtain via [10] Report on 44th IETF Meeting in Minneapolis, Minnesota. h-99mar-ietf-92.html [11] John Jubin and Janet D. Tornow. The DARPA Packet Radio Network Protocols. Proceedings of the IEEE, 75(1):21-32, January

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Unit 7 Media Access Control (MAC)

Unit 7 Media Access Control (MAC) Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland I Introduction Ad-hoc networks are formed by users or devices wishing to communicate, without the necessity

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

MAC. Fall Data Communications II 1

MAC. Fall Data Communications II 1 802.11 MAC Fall 2005 91.564 Data Communications II 1 RF Quality (ACK) Fall 2005 91.564 Data Communications II 2 Hidden Terminal (RTS/CTS) Fall 2005 91.564 Data Communications II 3 MAC Coordination Functions

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model American Journal of Applied Sciences 5 (6): 659-664, 2008 ISSN 1546-9239 2008 Science Publications Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

IEEE Medium Access Control. Medium Access Control

IEEE Medium Access Control. Medium Access Control IEEE 802.11 Medium Access Control EECS3214 3 April 2018 Medium Access Control reliable data delivery access control MAC layer covers three functional areas: security 2 1 MAC Requirements To avoid interference

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks

Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Simulation Based Analysis of the Impact of Hidden Terminal to the TCP Performance in Mobile Ad Hoc Networks Abstract The hidden terminal is classified as the sending hidden terminal and receiving hidden

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Recent Researches in Communications, Information Science and Education

Recent Researches in Communications, Information Science and Education AODV Based Multi-path Local Repairing Scheme for Mobile Ad Hoc Networks Eman Shaaban, PhD Computer Systems Dept. Faculty of computer and information science Ain-Shams university, Cairo, Egypt Eman.shaaban@cis.asu.edu.eg

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Lecture 16: Wireless Networks

Lecture 16: Wireless Networks &6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Abstract 1.1. OVERVIEW

Abstract 1.1. OVERVIEW Operation of Dynamic Source Routing in Wireless Mobile Ad Hoc Networks Kestina Rai 1, Rubinder Kaur 2, Kanchan Aggarwal CSE/IT Department, PTU Chandigarh Engineering College, Landran(Punjab) cupids2@rediffmail.com,rubykhokhar@gmail.com

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks c.buratti@unibo.it +9 051 20 9147 Office Hours: Tuesday 5 pm @ Main Building, third fllor Credits: 6 Protocol Stack Time Synchronization Energy Efficiency Distributed Processing

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network * Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu

More information

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

standard. Acknowledgement: Slides borrowed from Richard Y. Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data rate applications Ability to

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ

Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks Λ Samir R. Das Dept. of ECECS University of Cincinnati Cincinnati, OH 4522 Elizabeth M. Royer Dept. of ECE University of California,

More information

International Journal of Modern Trends in Engineering and Research e-issn: p-issn:

International Journal of Modern Trends in Engineering and Research   e-issn: p-issn: International Journal of Modern Trends in Engineering and Research www.ijmter.com A Review of Ad hoc on demand distance vector routing and proposed AR-AODV Bhavana Gupta 1, Rajesh Tiwari 2, Vikas Jain

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information