• Title/Summary/Keyword: Ad hoc MAC Protocol

Search Result 165, Processing Time 0.024 seconds

Comparison Study of Helper Node Selection Schemes of Cooperative Communications at Ad Hoc Networks (애드혹 네트워크에서 협력통신을 위한 도움노드 선정방법 비교연구)

  • Jang, Jae-Shin
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.2
    • /
    • pp.69-78
    • /
    • 2012
  • In this paper, a study on finding an appropriate helper node that can help increase effective frame transmission rate for cooperative communications at ad hoc networks is carried out. Those researches from reference use the reactive helper node selection mechanism which starts its role after exchanging RTS and CTS frames between source and destination nodes, and are implemented into our simulator for performance comparison. System throughput and average channel access delay are used for performance measures and all communicating nodes are assumed to move independently within the communication range. It is anticipated that this research result can be used as basic information for designing a new efficient helper node selection scheme.

A Traffic Management Scheme for Service Differentiation over MANETs (MANETs에서 차등서비스 제공을 위한 트래픽 관리 기법)

  • Kim Kwan-Woong;Bae Sung-Hwan;Kim Dae-Ik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.455-460
    • /
    • 2006
  • Currently, the IETF group is working on service differentiation in the Internet. However, in wireless environments such as Ad-hoc networks, where channel conditions are variable and bandwidth is scarce, the Internet differentiated services are suboptimal without lower layers' support. The IEEE 802.11 standard for Wireless LANs is the most widely used WLAN standard today. 1t has a mode of operation that can be used to provide service differentiation, but it has been shown to perform badly. In this paper, we present a new service differentiation scheme for support QoS in the wireless IEEE 802.11, which is based on a multiple queuing system to provide priority of user's flow. We simulate and analyze the performance of our algorithm and compare its performance with the original IEEE 802.11b protocol. Simulation results show that our approach increases overall throughput in the MAC layer.

Neighbor-Based Probabilistic Rebroadcast Routing Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

  • Harum, Norharyati;Hamid, Erman;Bahaman, Nazrulazhar;Ariff, Nor Azman Mat;Mas'ud, Mohd Zaki
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.1-8
    • /
    • 2021
  • In Mobile Ad-Hoc Network (MANET) Application, routing protocol is essential to ensure successful data transmission to all nodes. Ad-hoc On-demand Distance Vector (AODV) Protocol is a reactive routing protocol that is mostly used in MANET applications. However, the protocol causes Route Request (RREQ) message flooding issue due to the broadcasting method at the route request stage to find a path to a particular destination, where the RREQ will be rebroadcast if no Request Response (RREP) message is received. A scalable neighbor-based routing (SNBR) protocol was then proposed to overcome the issue. In the SNBR protocol, the RREQ message is only rebroadcast if the number of neighbor nodes less than a certain fix number, known as drop factor. However, since a network always have a dynamic characteristic with a dynamic number of neighbor nodes, the fix drop factor in SNBR protocol could not provide an optimal flooding problem solution in a low dense network environment, where the RREQ message is continuously rebroadcast RREQ message until reach the fix drop factor. To overcome this problem, a new broadcasting method as Dynamic SNBR (DSNBR) is proposed, where the drop factor is determined based on current number of neighbor nodes. This method rebroadcast the extra RREQ messages based on the determined dynamic drop factor. The performance of the proposed DSNBR is evaluated using NS2 and compared with the performance of the existing protocol; AODV and SNBR. Simulation results show that the new routing protocol reduces the routing request overhead, energy consumption, MAC Collision and enhances end-to-end delay, network coverage ratio as a result of reducing the extra route request messages.

Adaptive Medium Access Control protocol for low-power wireless sensor network (저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Yoon, Myung-Hyun;Yoo, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF

Analysis the Overhead of IEEE 802.11 RTS/CTS Handshake in Ad-hoc Networks Based Multipath Routing (다중경로 라우팅 기반 Ad-hoc Networks에서 IEEE 802.11 RTS/CTS 핸드세이크 오버헤드 분석)

  • Kim, Hyun-Chang;Lee, Jai-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.33-44
    • /
    • 2008
  • Multipath routing protocols with load balance, fault tolerance, aggregated bandwidth in Ad-hoc Networks provide improved throughput and reliable route as compared with singlepath routing protocols. However, multipath routing protocols have not been explored thoroughly in the domain of overhead in Ad-hoc Networks. In this paper, we analyze and compare on-demand singlepath and multipath routing with IEEE 802.11 DCF in terms of Routing overhead and MAC overhead. The results reveals that in comparison with singlepath routing protocol, multipath routing mechanism creates more overheads but provides better performance in congestion and capacity provided that the route length is within a certain upper bound which is derivable. The analytical results are further confirmed by simulation.

A Study on Multi-Channel Multi-Interface MAC Protocols for Mesh Networks (Mesh Networks을 위한 다중채널 다중인터페이스 MAC 프로토콜에 관한 연구)

  • Kim, Young-Beom
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1465-1470
    • /
    • 2011
  • In this paper, we propose a new MAC protocol, namely DM-MMAC (Doze Mode Multi-Channel MAC) for ad hoe wireless networks which can utilize multiple channels effectively, thereby enhancing the network throughput considerably. Basically, the IEEE 802.11 specification allows for the use of multiple channels available at the physical layer, but its MAC protocol is designed only for a single channel with the fatal drawback, so called multi-channel hidden terminal problem in multi-channel environments. In this vein, several multi-channel MAC protocols have been proposed, but most of them demonstrate the performance problem that its throughput drastically decreases as the number of mobile hosts residing in a given network increases with small number of available channels. In this work, we tried to improve the performance of multi-channel MAC protocols in terms of network throughput as well as power saving effects by simplifying the channel assignment and channel capturing procedures and reducing the possibility of collisions between mobile hosts.

Active Network, considering that high-speed Ad-hoc communication protocol (Active 네트워크를 고려한 고속 이동 Ad-hoc 통신 프로토콜)

  • Kim, Jung-Eun;Jang, Hae-Suk;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.283-288
    • /
    • 2009
  • 고정된 망을 가지지 않고, 이동 호스트로만 이루어져 통신되는 망인 Ad-hoc 네트워크에서 고속으로 이동 중인 차량들 간의 긴급한 정보를 주고받아 고속도로에서의 다중 충돌사고를 미연에 방지할 수 있는 차량 통신 프로토콜을 제안한다. 본 논문에서는 도로위의 차량들은 서로 연계성이 없기 때문에 위치추적시스템인 GPS에서 수신한 거리 값을 연계하여 클러스터를 구성한다. 클러스터를 IEEE 802.11 MAC 계층에서 구성하기 때문에 경로 설정으로 인한 과부하문제를 해소 하였다. 논문에서 제안한 액티브 네트워크 기반의 멀티 홉 라우팅 프로토콜은, Active 네트워크를 이용하여 안정된 통신이 이루어 질수 있도록 한다.

  • PDF

TCP Performance Improvement Considering ACK Loss in Ad Hoc Networks

  • Kim, Dong-Kyun;Yoo, Hong-Seok
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.98-107
    • /
    • 2008
  • In mobile ad hoc networks, packet loss is unavoidable due to MAC contention, link failure or the inherent characteristics of wireless link. Since TCP relies on the timely reception of TCP ACK packets to progress the transmission of the TCP DATA packets, ACK loss obviously affects the performance due to two main problems: (a) Frequent occurrence of spurious retransmissions caused by timeout events and (b) impairment of the fast retransmit mechanism caused by the lack of a sufficient number of duplicate ACK packets. In particular, since most reactive routing protocols force the packets buffered over a path to be discarded while performing a route recovery, the performance degradation becomes more serious due to such ACK loss. In this paper, therefore, TCP with two piggybacking schemes (called TCP-pgy) is proposed in order to resolve the above-mentioned problems over reactive routing protocols. Through extensive simulations using the ns-2 simulator, we prove that our proposed schemes contribute to TCP performance improvements.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.