A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION

Similar documents
A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Medium Access Control Protocols: scheduled schemes

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Routing Protocols in MANETs

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Impact of Hello Interval on Performance of AODV Protocol

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Estimate the Routing Protocols for Internet of Things

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Performance Evaluation of MANET through NS2 Simulation

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Routing Protocols in MANET: Comparative Study

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Routing Protocols in Mobile Ad-Hoc Network

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

2013, IJARCSSE All Rights Reserved Page 85

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Computation of Multiple Node Disjoint Paths

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Power aware Multi-path Routing Protocol for MANETS

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Performance Evaluation of AODV and DSR routing protocols in MANET

Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.

A Survey - Energy Efficient Routing Protocols in MANET

Figure 1: Ad-Hoc routing protocols.

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

SUMMERY, CONCLUSIONS AND FUTURE WORK

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

II. ROUTING CATEGORIES

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Comprehensive Study and Review Various Routing Protocols in MANET

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Effects of Caching on the Performance of DSR Protocol

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Performance Evaluation of Various Routing Protocols in MANET

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

QoS Based Evaluation of Multipath Routing Protocols in Manets

AODV-PA: AODV with Path Accumulation

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Ad Hoc Routing Protocols and Issues

Keywords: AODV, MANET, WRP

A Literature survey on Improving AODV protocol through cross layer design in MANET

Comparative Performance Analysis of AODV,DSR,DYMO,OLSR and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model

Performance Analysis of MANET Routing Protocols OLSR and AODV

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Mobile Communications. Ad-hoc and Mesh Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Effect of 3 Key Factors on Average End to End Delay in MANET

Integration of Internet with Mobile Ad-Hoc Network: By Extended AODV

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Wireless Networking & Mobile Computing

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Performance Evaluation and Comparison of AODV and AOMDV

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Transcription:

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 A STUDY & ANALYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION S. Upadhyay 1, A. Upadhyay 2, P. Joshi 3 and Suresh C.Gupta 4 1 Department of Electronics& Communication, Cambridge Institute of Technology, Ranchi, Jharkhand 2 Department of Electronics& Communication, Dehradun Institute of Technology (University), Dehradun, UK ABSTRACT: Channel access protocol is very important issue for node (link) scheduling and we try to focus on the Hybrid Activation Multiple Access Scheduling protocol (HAMA) for wireless ad hoc networks through this work. This channel access scheduling protocols activate either nodes or links only; HAMA is a node-activation oriented channel access scheduling protocol that also maximizes the chance of link activations. According to HAMA, the only required information for scheduling channel access at each node is the identifiers of neighbors within two hops. Using this neighbourhood information, multiple winners for channel access are elected in each contention context, such as a time slot in a frequency band or a spreading code. Except for time slot synchronization and neighbor updates on the two-hop neighborhood changes, HAMA dedicates the bandwidth completely to data communication. The frame loss and throughput characteristics of HAMA are analyzed, and its performance is compared with pure node activation based scheduling protocols by simulations on different application. Keywords: MANET, Channel access protocol, mobility model, routing protocol NCR Algorithm [I] NTRODUCTION A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. In this paper, we analyze packet scheduling algorithm to find those that most improve performance in congested network. Hence, a scheduling algorithm to schedule the packet based on their priorities will improve the performance of the network. Packet schedulers in wireless ad hoc networks serve data packets in FIFO order. Scheduling algorithms are important components in the provision of guaranteed quality of service parameters. The design of scheduling algorithms for mobile ad hoc networks is challenging one because of highly variable link error rates and dynamic nature of the network. An ad hoc network is a self-organizing wireless network comprised only of mobile nodes interconnected by a multihop path and without the support of any pre-existing wired infrastructure. In these networks, the mobility of nodes and the error-prone nature of the wireless medium introduce many challenges, including frequent route changes and packet losses. Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 63

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION These problems increase the packet delays and decrease the throughput. As traffic load in the network increases, the performance of the network decreased. Research in this area has focused primarily on routing protocols and medium access control (MAC). However, there is little understanding of the queuing dynamics in the nodes of these networks and different packet scheduling algorithms in the queues of the nodes provide solution for performance degradation. Thus scheduling algorithm manages the changes in queuing dynamics in different situation also improves the performance of the network. We apply the NCR algorithm to derive four channel access protocols in ad hoc network. [II] MOBILE AD-HOC NETWORK (MANET) A mobile ad-hoc network (MANET) is a collection of mobile nodes which consist of temporary network without the aid of any centralized infrastructure and it acts as a both host and routers. It is an autonomous system of mobile hosts connected by wireless networks links which does not required any wired support for intercommunications. Collaborative computing and communications in smaller areas can be set up using MANET, such as office buildings, organizations, conferences etc. The network's wireless topology may be unpredictable. This has been an area of active research, and progress has been reported in several directions [1]. This type of network play very important role at the time of emergency as it can build their network in few hour and people can quickly share information and data acquisition operations in inhospitable terrain. The MANETs routing protocols are characteristically subdivided into three categories: Table Driven Routing Protocol (Proactive), On Demand Routing Protocol (Reactive) and Hybrid Routing Protocol. MANET routing protocols are subdivided into two categories as shown below in [Figure-1]. MANET Reactive Proactive DSDV AODV DSR Figure: 1. MANET & its concerned routing protocol 94

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 2.1 Reactive Routing Protocol.This protocol also called the on- demand routing protocol. On-demand routing protocols were designed to reduce the overheads in proactive protocols by maintaining information for active routes only. This means that routes are determined and maintained for nodes that require sending data to a particular destination. Route discovery usually occurs by flooding a route request packets through the network [2]. 2.1.1 Ad-hoc On-demand Distance Vector Routing (AODV) AODV uses a simple request-reply mechanism for the discovery of routes shown in [Figure-2]. It can use hello messages for connectivity information and signals link breaks on active routes with error messages. Routing information has a timeout associated with it as well as a sequence number. The use of sequence numbers allows detecting outdated data, so that only the most current, available routing information is used. This ensures freedom of routing loops and avoids problems known from classical distance vector protocols. When a source node S wants to send data packets to a destination node D but does not have a route to D in its routing table, then a route discovery has to be done by S. The data packets are buffered during the route discovery. The source node S broadcasts a RREQ (Route Request) throughout the network. In addition to several flags, a RREQ packet contains the hop count, a RREQ identifier, the destination address and destination sequence number, and the originator address and originator sequence number. The hop count field contains the distance to the originator of the RREQ, the source node S [3]. It is the number of hops that the RREQ has travelled so far. Dest Next Hop AA AA BB RREQ RREQ RREQ AA CC A B C D RREP RREP RREP D.B B.B D.B B.B C.C D.B B.B D.D Fig: 2. AODV route discovery Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 95

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION 2.1.2 Dynamic Source Routing (DSR) Protocol DSR is a source routing protocols, and requires the sender to know the complete route to destination. It is based on two main processes: (a) the route discovery process which is based on flooding and is used to dynamically discover new routes, maintain them in nodes cache, (b) the route maintenance process, periodically detects and notifies networks topology changes. Discovered routes will be cashed in the relative nodes. Here route are stored in memory and data packet contains source route in packet header [4]. In DSR, every mobile node in the network needs to maintain a route cache where it caches source routes that it has learned [5]. 2.2. Proactive Routing Protocol (Table-Driven Routing Protocol): In proactive routing, each node has one or more tables that consist of latest and update information of the routes to any node in the network. Each row has the next hop for reaching a node/subnet and the cost of this route. Various table-driven protocols differ in the way the information about a change in topology is propagated through all nodes in the networks. There exist some differences between the protocols that come under this category depending on the routing information which is updated in each routing table. Also, these routing protocols maintain different number of tables. This protocol is not well node entries for each and every node in the routing table of every node this will cause more overhead in the routing table leading to more consumption of bandwidth. Example: Conventional routing schemes, DSDV. [III] RELATED WORK Based on NCR, the node activation multiple access protocol (NAMA) elects nodes for collision-free broadcast transmissions over a single channel. The link activation multiple access (LAMA), the pair-wise link activation multiple access (PAMA), and the hybrid activation multiple access (HAMA) protocols operate over multiple channels that are orthogonal by codes or frequencies to elect either links or nodes for collision-free unicast transmissions, or a mix of broadcast and unicast transmissions [6][7]. We analyze four channel access protocol NAMA, LAMA, PAMA and HAMA and used for different application like FTP, VoIP transfer for real scenario mobile ad hoc network. The four channel access protocol has been considered for this paper and implemented in different application to judge the performance of best channel access protocol. This paper gives the proper idea about the best channel access protocol for choosing suitable access protocol for efficient network of designing. This also helps us to improve the QoS parameters. In HAMA, it is possible that a node has to yield due to the hidden terminal problem, making the corresponding time slot useless for the yielding node [8]. HAMA is a timeslotted code division multiple access scheme based on direct sequence spread spectrum (DSSS) transmission techniques. In DSSS, code assignments are categorized into transmitter-oriented, receiveroriented or a per-link-oriented code assignment schemes (also known as TOCA, ROCA and POCA, 96

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 respectively) in ad hoc networks. HAMA adopts transmitter-oriented code assignment because of its broadcast capability [9]. [V] PROBLEM FORMULATION The four channel access protocol has been considered for this paper and implemented in different application to judge the performance of best channel access protocol. This paper gives the proper idea about the best channel access protocol to the engineers for choosing suitable access protocol for efficient network of designing. The different channel access protocol is shown in [Figure-3]. NAMA PAMA LAMA HAMA Figure: 3. Different channel access protocol 4.1 Operation of HAMA HAMA randomly assigns a code to each node in each time slot, and to resolve possible collisions using NCR (Neighborhood-aware contention resolution) algorithm. HAMA works in the following manner: a) Compute the priorities and code assignments of the nodes within the two-hop neighborhood using the following given equation (1) & (2) i.txcode =, k = Hash (i t ).. (1) i.prior = Hash (i t). (2) where Hash (x) = fast message digest generator that return a random integer by hasing the input value (x) and used to carry out the concatenation operation on its two operand. b) A node then derives its state by comparing its own priorities with the priorities of its neighbors. We only require that nodes with higher priorities transmit to those nodes with the lower priorities. This is the overall operation of HAMA Channel access protocol. We focus only on the HAMA channel access protocol and try to judge the performance of this protocol. Although there are many channel access protocol but many literature give idea that HAMA is the one that is more suitable for channel access protocol [10]. The result of the analyses show that HAMA achieves higher channel utilization in ad-hoc network than a distributed scheduling scheme based on node activation, similar throughput as a wellknown scheduling algorithm based on complete topology information, and much higher throughput than ideal CSMA and CSMA/CA protocol. [VI] SCENARIO FOR PERFORMANCE ANALYSIS Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 97

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION In this work 16 mobile nodes are considered, the initial position of these nodes are random in the flat grid aria of 800x800 and in z-direction 2000-3000 are considered, so nodes are spared in 800x800 area. In this work one source and one destination node is considered, the starting node is the source node and last node is destination node. All node have mobility, in this work mobility is set as each node change its position after 10 sec and after this node changes its position in every 5 sec all new positions are random in nature. So, in this work we compare three different channel access protocols under different application. Figure: 4. Scenario for FTP Figure: 5. Scenario for VoIP [VII] SIMULATION TOOL EXata is a network emulator that lets you evaluate on-the-move communication networks faster and with more realism than any other emulator. It creates a digital network replica that interfaces with real networks and applications. EXata is composed of the following tools: 1. EXata Architect A graphical experiment design and visualization tool. Architect has two modes: Design mode, for designing experiments, and Visualize mode, for running and visualizing experiments. 2. EXata Analyzer A graphical statistics analyzing tool. 3. EXata Packet Tracer A graphical tool to display and analyze packet traces. 4. EXata File Editor A text editing tool. 98

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 5. EXata Command Line Interface Command line access to the simulator. EXata is a comprehensive suite of tools for emulating large wired and wireless networks. It uses simulation and emulation to predict the behavior and performance of networks to improve their design, operation, and management [11]. EXata SVN provides a cost-effective and easy-to-use alternative to physical test beds that typically have high equipment costs, complex setup requirements and limited scalability. [VIII] MOBILITY MODEL The mobility model uses (RANDAM WAYPOINT MODEL) in a rectangular aria of 800m x 800m with 26 nodes. During the simulation starts its journey form a random spot to a random chosen destination and after every 5 second the topology of the network changed. Once the destination reached, the node takes a rest period of time in second and another random destination is chosen after that pause time the pause time is taken for this simulation is vary for 10s, 20s and 50s. The modal parameters that have been used in the following experiments are summarized in [Table-1] and [Table-2]. Sl. No. Wireless subnet properties 1 Physical Radio type 802.11b, Data rate = 2Mbps, Receiver Sensitivity at 2Mbps = - 91.0dBm 2 MAC Protocol = TDMA, Slot duration = 2.06 ms, Guard time = 1ms, Slot/frame = 16, Propagation delay = 5µs 3 Network Queue size (bytes) =1024, Input/output Queue Scheduler = Round Robin 3 Routing Protocol AODV, Maximum buffer size (bytes) = 4 Router Specified User specified Table: 1. Wireless subnet properties for FTP. 10 Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 99

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION Sl. No. Parameter Value 1 Simulator Exata Cyber 2.0 2 Protocols Considered AODV& DSR 3 Simulation Time 10s, 20s & 100sec. 4 Simulation Area 800m x 800m 5 Transmission Range 200-250m 6 Node Movement Model Random Direction 7 Bandwidth Used 2 Mbps 8 Traffic Type CBR /VBR 9 Data Payload Bytes/packet 10 Channel Access Protocol HAMA Table: 2. Simulation parameter [IX] SIMULATION RESULT The simulation result for FTP and VoIP is shown below: For FTP 16 nodes has been taken and all are activate and for VoIP 16 nodes has been considered and only four nodes are used in which two nodes act as an transmitter and two nodes acts as an receiver shown in [Figure-4] and [Figure-5]. Figure: 6. Throughput of FTP client. 100

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 Figure: 7. Throughput of FTP server. Figure: 8. Total packet received from network layer (FTP) Figure: 9. Broadcast packet received (FTP) Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 101

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION Figure: 10. Total frame received by FTP Sl. No. Link Properties 1 Link Wireless 2 Bandwidth 2Mbps 3 Propagation speed 3 m/s 4 Source 1, 4 5 Destination 16, 13 6 Average talk time 20 sec and 30 sec 7 Start time 7 sec and 5 sec 8 End time 19 sec and 25 sec 9 Encoding G.711 10 Packetization By interval 11 Packetization interval 20ms 12 Channel Access HAMA Table: 3. Link properties of VoIP 102

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 Figure: 11. Total packet received by VoIP Figure: 12. Total frame received from network layer (VoIP) Figure: 13. Total data packet received (VoIP) Figure: 14Data packet received (AODV for IPv4) (VoIP) Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 103

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION Figure: 15. Broadcast packet received (VoIP) Figure: 16. Signal received and forwarded to MAC layer Figure: 17. Frame received by VoIP 104

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 www.ijcea.com ISSN 2321-3469 [X] CONCLUSION & DISCUSSION From above simulation result it is very clear that the performance of channel access protocol i.e. HAMA is efficient for FTP and VoIP. The simulation result shows that HAMA improves channel link utilization to give good throughput. Also the performance of LAMA, NAMA and PAMA have been tested with same scenario, but here we found that the performance of HAMA channel access protocol is better than other channel access protocol as mention above. REFERENCES [1] A. Kumari, N. Gandotra, S. Upadhyay and P. Joshi, Impact of Node Movement on MANET Using Different Routing Protocol for Qos Improvement Under Different Scenario, International Journal of Smart Sensor and Ad-Hoc Network (IJSSAN), Vol. 1, pp. 95, March 2012. [2] S. Upadhyay, P. Joshi, N. Gandotra and A. Kumari, Comparison and performance analysis of reactive type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network, using NS-2 simulator, Journal of Engineering and Computer Innovations (JECI) Vol. 2(10), pp. 36-47, March 2012. [3] Y.D Kim, I.Y Moon and S.J Cho, A comparison of improved AODV routing protocol based on IEEE 802.11 and IEEE 802.15.4, Journal of Engineering Science and Technology (JEST), Vol. 4, No. 2, pp. 132 141, 2009. [4] S.Upadhay, A. Kumari and N.Gandotra, Impact of node mobility on the performance of wireless network using distance vector routing protocol International Journal of Computer Application (IJCA), Vol. 57, No. 12, pp. 14-21, November, 2012. [5] V. Singla, R. Singla, A. Kumar, Performance Evaluation and Simulation of Mobile Ad-hoc Network Routing Protocols, International Journal of Engineering and Innovative Technology (IJEIT) Vol. 1, No. 1, pp. 49-53 Oct 2009 [6] L. Bao and J.J. Garcia-Luna-Aceves, Distributed Transmission Scheduling Using Code-Division Channelization E. Gregori et al. (Eds.): NETWORKING 2002, LNCS 2345, pp. 154 165, Springer-Verlag Berlin Heidelberg 2002. [7] H. Xu and X. Wang, Comparative analysis of scheduling algorithm in ad-hoc mobile networking IEEE, August 09, 2010. [8] M. Aur and A. Spohn, Power Efficient Hybrid Channel Access Scheduling in Wireless Multihop Networks, IEEE AICT, pp. 278-283, Nov. 2009. [9] L. Bao and J. Garcia-Luna-Aceves, Hybrid channel access scheduling in ad hoc networks, IEEE ICNP, pp. 46 57, Nov.2002. Shrikant Upadhyay, Aditi Upadhyay, Pankaj Joshi and Suresh Prem Gupta 105

A STUDY AND ANLYSIS OF SUITABLE CHANNEL ACCESS PROTOCOL FOR MOBILE AD-HOC NETWORK ON DIFFERENT APPLICATION [10] S. Ramanathan and E. L.Lloyd Scheduling algorithm for multihop radio network IEEE/ACM, Vol. 1, No.2, April 1993. [11] http://www.scalable-networks.com/publications/whitepapers.php 106