RAVIKANT Paper 1 Suvey
RAVIKANT Paper 1 Suvey
RAVIKANT Paper 1 Suvey
Wireless Network
Er.Ravi kant Vishwakarma, 2Prof.Mukta Sahu
1
1
Mtech scholar, Department of ECE Engineering, LNCT (Bhopal) Indore Campus
(old name:- Lord Krishna college of technology, Indore)
2
Asst. professor, Dept. of ECE Engineering, LNCT (Bhopal) Indore Campus
(old name:- Lord Krishna college of technology, Indore)
ABSTRACT: A Mobile Ad Hoc Network (MANETs) is a collection of wireless hosts that can be
rapidly deployed as a multi hop packet radio network without the aid of any established infrastructure or
centralized administration [1] . Medium Access Control (MAC) protocols are responsible for coordinating
the access from active nodes. Carrier Sense Multiple Access (CSMA) refers to a family of protocols used
by stations contending for access to a shared medium like an Ethernet cable or a radio channel. MACA
(Multiple Accesses with Collision Avoidance) Protocol is a Contention based Sender initiated Protocol
which uses Three way handshaking means that Request to send packet, clear to send packet ,Data packet
exchange. By the help of binary exponential back off Algorithm avoid congestion problem and this
algorithm help to determine correct sending rate. in which if any packet transmitted by a node is drop, the
node uses the back-off (BEB) algorithm to random amount of time . A comparative study was done on
Ns-2 2.35 Version simulator over CSMA & MACA. DSR routing protocol will use to evaluate the
CSMA& MACA performance the aim of this research is to compare the standardized MAC protocols on
MANETs and thereby analyzing performance under varying node density of network with different MAC
protocols. The routing protocols that are considered in the analysis is Dynamic Source Routing. In
addition, from the transport layer's perspective, it is necessary to consider MAC protocols as well for
MANETs because of its wide application, which enjoys the advantage of decisive data transmission on
the Internet. Hence, it is of utmost important to identify the most suitable and efficient MAC protocols
that can perform under these specific conditions.
1.0 INTRODUCTION
As wireless networks provide access computing and communication services on the move regardless of
users location. The one type of wireless network is infrastructure less networks that is known as Mobile
Ad-Hoc Networks (MANET) [1]. It is a self-configuring infrastructure fewer devices connected by
wireless and equipped with networking capability. In these networks host movement is rapid. All nodes
are capable to move and can be connected dynamically in arbitrary manner means topology change
frequently. In wireless Ad-Hoc Networks, the nodes themselves from the network, and they do not need
fixed infrastructure, therefore each node executes routing functionalities, such as forwarding network
traffic. Before designing an Ad-Hoc wireless, we should consider different aspects, such as the use of the
media access control protocol, routing protocol, transport layer protocol, quality of service, or support of
security. To work properly the different protocols in wireless Ad-Hoc Networks must handle different
issues, such as the noise of the network, routing information error, transmission ranges, etc. Sometimes in
one node, only part of the information collected by one protocol is delivered to another protocol and a
misinterpretation among these protocols may happen. To deal with this, we propose modification in the
Media Access Control 802.11 protocol to avoid launching unnecessary operations in the DSR (Dynamic
Source Routing) protocol, achieving better performance in the network, i.e. less routing overload, less
routing changes, less packets collisions, less route errors, less MAC errors, and more throughput.
Concretely, DSR protocol launches route error when a neighboring node is still near, because it
understands the information received from the MAC layer as a broken link. Usually the interferences
among radio ranges of nodes could lead to this disagreement. The proposed approach tracks the signal
strength of each node, informing the routing layer that the node has enough signal strength, skipping the
route error launched by DSR. A MAC protocol is an essential part of a Mobile Ad-Hoc Network that
controls how nodes access the shared medium. It is important because a well-designed MAC protocol can
maximize the performance and adequacy of the network. A great effort has been put into research to
invent the MAC protocol with the best performance possible [2].
Throughput Through put is defined as the number of packets flowing through the channel at a
particular instant of time. This performance metric signifies that the total number of packets that
have been successfully delivered from source node to the destination node.
Σ Packet Received
Throughput = ————————————————— ......................(1.2)
Transmission time
Routing overhead Routing Overhead is the ratio of overhead byte to the delivered data byte. The
transmission at each hop along the route is counted as one transmission in the calculation of this
metric.
The main challenge in the MAC layer is how to allocate the channel among competing users. Before
discussing the major protocols used in the MAC layer, there are several key issues to be noted [21].
Single channel assumption: One single channel is available for all stations.
Collision assumption: If two frames are transmitting at the same time, they overlap in time and
the signal becomes garbled.
Slotted time: Time is divided into intervals called slots. Transmission of frames always starts in
the beginning of a slot. The users transmit in rapid succession, one after another, each utilizing its
own time slot.
No carrier sense: Stations cannot sense the channel before using it. Only after transmission, a
station may verify whether the transmission was successful or not.
Carrier sense: Stations are able to realize if the channel is busy or not. If the channel is busy a
station will not attempt to use the channel until it becomes idle.
2.1 Operation
The classical Local Area Networks (LAN) use Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) in the MAC layer for channel allocation [17]. Using CSMA/CD, if two stations try to get the
channel at the same time, they will detect a collision and will abort the transmission. After the collision is
detected, a station waits a random period, and then it tries again to get the channel. This protocol cannot
be used in wireless networks because the range of the nodes must be considered. In Wireless Networks,
the interferences may happen in the receiver whereas; CSMA/CD only considers interference in the
sender. This will be explained in the hidden/exposed terminal problem.
Hidden and exposed problem: The hidden station problem arises when there is collision of
packets at the receiving node, because when nodes are transmitting, they are not within the
transmission range of each other, but they are in the transmission range of the receiver [17].
Consider figure 4.1, where S1 is transmitting to R1, S2 can potentially interfere with R1 but not
with S1. If S2 sense the channel, it will not hear S1 because it is out of range, and therefore
mistakenly conclude that it can transmit to R1. At this moment, if S1 starts to transmit it will
collide at node S2, resulting in lost packets. In Wireless Networks, the exposed node
problem occurs when a node is prevented from sending packets to other nodes due to a
neighboring nodes .The exposed station problem happens when a node concludes mistakenly that
cannot transmit, because a nearly node is transmitting to another node. Consider again figure 4.1,
where S1 is transmitting to R1. If S3 sense the channel it will hear an ongoing transmission, and
it will falsely conclude that cannot transmit to R2. In this case, collision could happen only in the
zone between S1 and R1.
3.1 Classification
Mobile Ad-Hoc Network is a composition of a group of mobile, wireless nodes, which cooperate in
forwarding packets in a multi-hop fashion without any centralized administration. In a MANET, each
mobile node acts as a router as well as an end node which is either source or destination because the
structure of the network changes dynamically [15]. Mobile Ad-Hoc Networks are categorized by a
dynamic, multihop, rapid changing topology. The classification of routing protocol is:
NS-2 is one of the most popular open source network simulators. The original Network Simulator is a
discrete event simulator targeted at networking research.
Network Simulator
A package of tools that simulates behavior of networks.
Create Network Topologies, Log events that happen under any load.
Analyze events to understand the network behavior.
In order to solve the hidden and exposed terminal problem in CSMA , researchers have come up with
many protocols which are contention based but involve some form of dynamic reservation /collision
resolution. in particular we shall discuss several important contention based schemes in the signal
channel, receiver initiated, power aware, multiple channel and QOS aware categories.
The earliest protocols that were designed to implement as a MAC layer protocols were the single
channels schemes. Using one channel to share all the information (control signals and the DATA), these
schemes faced a lot of problems that decreased the efficiency of the entire network.
7.0 CONCLUSION
A Mobile ad hoc network (MANET) is a self organizing, self managing infrastructure less wireless
communication network in which all nodes can be considered as hosts or routers. In these networks, the
Medium Access Control (MAC) protocols are responsible for coordinating the access from nodes. In
order to avoid transmission collisions in MANETs, a reliable and energy efficient MAC protocol is
needed. media access control protocol are design to overcome some Ad-hoc wireless network issues and
issues are: (node mobility; Limited bandwidth availability ,an error- prone broadcast channel;
synchronization; bandwidth efficiency; Hidden and exposed terminal problem ,QoS support) . In this
article, we present a comprehensive survey of major MAC schemes, which integrating various issues and
challenges.
8.0 REFERENCES
[1] T. Bheemarjuna Reddy, I. Karthikeyan, B.S. Manoj, C. Siva Ram Murthy, ―Quality of service provisioning in
ad hoc wireless networks: a survey of issues and solutions‖, Department of Computer Science and Engineering,
Indian Institute of Technology, Madras 600036, India, Ad Hoc Networks 4 (2006) 83–124.
[2] Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu, ―Mobile ad hoc networking: imperatives and challenges‖,
University of Texas at Dallas, Dallas, TX, USA, Ad Hoc Networks 1 (2003) 13–64.
[3 ]C.K. Toh, ―Ad Hoc Mobile Wireless Networks: Protocols and Systems‖, Springer Prentice Hall Publishers,
ISBN 013 007 8174, 2001.
[4] Azzedine Boukerche, ―Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks‖, University of
Ottawa, Ottawa, Canada, ISBN 978-0-470-38358-2 (cloth) TK5105.77.A44 2008.
[5] Arun Kumar B. R., ―Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols‖,
Bangalore & Research Scholar, Dept. of CS, School of Science & Technology, Dravidian University,
Kuppam517425, A. P., India, June 2008.
[6] S Krishnamurthy, ―Ad-Hoc Networks - Technologies and Protocols – P Mohapatra‖, Springer Publishers, 2004
(ISBN: 0-387-22689-3).
[7] Changzhou Wang, Guijun Wang, Haiqin Wang, Alice Chen, ―Quality of Service (QoS) Contract Specification,
Establishment, and Monitoring for Service Level Management‖, Rodolfo Santiago Boeing Phantom Works Seattle,
WA, USA 0-7695-2743-4/06, 2006.
[8] El-Bahlul Fgee, Jason D. Kenney, William J. Phillips, William Robertson, ―Comparison of QoS performance
between IPv6 QoS management model and IntServ and DiffServ QoS models‖, Dalhousie University, Department of
Engineering Mathematics, and Halifax, ISBN:0-7695- 2333-1, 2005.
[9] QualNet 4.5 Programmer’s Guide, Scalable Network Technologies, Inc., 6701 Center Drive West, Suite 520,
Los Angeles, CA 90045.
[10] Scalable Network Technologies, ―QualNet simulator 4.0 Version‖, tutorial on
http://www.cs.binghamton.edu /~vinkolar/QualNet/qualnet-tut1.pdf.
[11] C.E. Perkins, ―Ad Hoc Network‖, Pearson Education, ISBN: 8131720969, 2008.
[12] C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Wireless Networks: Architectures and Protocols‖, Pearson
Education, ISBN13: 9780131470231 ISBN10: 0- 13- 147023-X, 2008.
[13] Blerta Bishaj, ―MAC protocols, contention-based with reservation and scheduling‖, Helsinki University of
Technology.
[14] Bartlomiej Zielilski, ―Contention MAC Protocols Efficiency Testing in a Small Wireless Network‖, Silesian
Technical University, Bartlomiej.
[15]Alan Demers, Scott Shenker, Lixia Zhang, ―Media Access Protocol for Wireless LAN’s‖, University of
California at Berkeley. [16] Akhilesh Kumar Dubey Anjana Jain S.V. Charhate, ―Performance Evaluation of MAC
layer Protocols for Ad hoc WLAN‖, 23 Park Road Indore (M.P.) INDIA DOI