16,130 research outputs found

    Quality of Service-Based Medium Access Control Mechanism for Multimedia Traffic in Mobile Ad Hoc Networks

    Get PDF
    This thesis describes an investigation on the problem of quality of service (QoS) support in mobile ad hoc networks (MANETs). The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes cannot be relied on. This thesis presents a medium access control (MAC) QoS mechanism for multimedia applications in IEEE 802.11e based MANETs. IEEE 802.11e standard draft includes new features to facilitate and promote the provision of QoS guarantees in wireless networks with a long-term solution based on QoS-architectures. The motivation is driven by the need to support increasing demand of time-sensitive applications such as Voice over IP (VoIP) and video conferencing applications. IEEE 802.11e enhances the Distributed Coordination Function (DCF) and the Point Coordination Function (PCF) of the legacy IEEE 802.11, through a new coordination function: the Hybrid Coordination Function (HCF). Within the HCF, there are two methods of channel access: HCF Controlled Channel Access (HCCA) and Enhanced Distributed Channel Access (EDCA). EDCA operates in infrastructure-less ad hoc mode and is widely used in MANETs, unlike HCCA, which further assures QoS provisioning operates in infrastructure mode in the presence of access points (AP). Recent researches showed that EDCA lacks QoS support of real-time traffic in MANETs due to its contention based medium access method. This thesis takes HCCA QoS provisioning potentials to MANETs by implementing a MAC mechanism in which HCCA is employed on top of EDCA to work in infrastructure-less environment like MANET with the help of multiple channels. The mechanism dedicates a unique receiver-based channel to every mobile node. It will act as virtual hybrid coordinator (VHC) to exercise control over the channel in contention-free manner while maintaining a common channel in which all mobile nodes can exchange broadcast and routing related messages. The mechanism can be easily integrated with existing 802.11 systems without modification to existing protocols while ensuring a level of admission control and resource reservation over the medium. Simulation results indicate that the mechanism significantly improves the overall network throughput by 20% at the saturation point and improves average delay by 20% at the saturation point compared to pure EDCA with or without multiple channels. Even with multi-channel EDCA, our mechanism guarantees better performance in terms of throughput and MAC delay for high priority traffic in MANET. The research contribution on MAC layer can be integrated into a larger framework for QoS support in MANETs, which opens a wide range of further research in QoS provisioning in MANETs and solve QoS multi-layer design and implementation issues

    COMB: Cell based Orientation aware MANET Broadcast MAC layer

    Get PDF
    The design of a collision avoidance system for trains implies the design of a MAC layer for their specific requirements. It should be efficient, reliable, use broadcast and support wireless mobile ad hoc networks (MANETs) with high user speeds. Therefore we are using awareness techniques, which allow a certain channel assignment, despite the absence of infrastructure. This paper presents a new MAC layer protocol designed for broadcast MANETs called COMB (Cell-based Orientation-aware MANET Broadcast). In principle, COMB allows the realization of a collision free transmission, high speed is supported and no handshake is required. COMB is based on localization aware cross layer dimensioned CDMA cells, and uses the SOTDMA protocol as intra cell scheme, while the inter cell scheme relies on direction and speed awareness

    Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks

    Get PDF
    Mobile ad-hoc networks comprise a type of wireless network that can be easily created without the need for network infrastructure or administration. These networks are organized and administered into temporary and dynamic network topologies. Unfortunately, mobile ad-hoc networks suffer from some limitations related to insufficient bandwidth. The proliferation of new IP Multimedia subsystem services (IMs), such as Push-to-talk (PTT) applications consume large amounts of bandwidth, resulting in degraded QoS performance of mobile ad-hoc networks. In this thesis, a Priority XCAST based routing protocol (P-XCAST) is proposed for mobile ad-hoc networks to minimize bandwidth consumption. P-XCAST is based on demand route requests and route reply mechanisms for every destination in the PXCAST layer. To build the network topology and fill up the route table for nodes, the information in the route table is used to classify the XCAST list of destinations according to similarities on their next hop. Furthermore, P-XCAST is merged with a proposed Group Management algorithm to handle node mobility by classifying nodes into two types: group head and member. The proposed protocol was tested using the GloMoSim network simulator under different network scenarios to investigate Quality of Service (QoS) performance network metrics. P-XCAST performance was better by about 20% than those of other tested routing protocols by supporting of group size up to twenty receivers with an acceptable QoS. Therefore, it can be applied under different network scenarios (static or dynamic). In addition Link throughput and average delay was calculated using queuing network model; as this model is suitable for evaluating the IEEE 802.11 MAC that is used for push to talk applications. The analytical results for link throughput and average delay were used to validate the simulated results

    A performance modeling of ad hoc networks with multi-cell overlapping interference

    Get PDF
    Mobile ad hoc networks are non-infrastructure-based wireless networks which are expected to be an important part of 4G architecture. In this type of network, nodes are both source of information as well as they participate in relaying the information to their final destinations. Due to the broadcast nature of wireless transmission, mobile ad hoc networks require an effective MAC protocol to share the medium. In recent years, many MAC protocols have been proposed in the literature for this purpose, such as Dual Busy Tone Multiple Access (DBTMA) [3] protocol. In this thesis, we first propose to modify DBTMA protocol through inserting a third busy tone, BTd (data transmit busy tone) to protect data transmissions and the modified protocol is referred to as Triple-BTMA (T-BTMA). Second, we show that the existing performance model of DBTMA fails to consider the effects of multi-cell overlapping interference. The main contribution of this thesis is development of a performance analysis of T-BTMA protocol that takes into account properly the multi-cell overlapping interference. We show that our model may also be adopted for most Ready-to-Send/Clear-to-Send (RTS/CTS) based MAC protocols. We develop a simulation environment to validate approximations in our mathematical model. We find that theoretical results are in agreement with those of simulations. Finally, we extend our model into power-controlled networks and it is shown that a proper power control can lead to an ideal channel throughput

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    Intrusion Detection in Mobile Adhoc Network with Bayesian model based MAC Identification

    Get PDF
    Mobile Ad-hoc Networks (MANETs) are a collection of heterogeneous, infrastructure less, self-organizing and battery powered mobile nodes with different resources availability and computational capabilities. The dynamic and distributed nature of MANETs makes them suitable for deployment in extreme and volatile environmental conditions. They have found applications in diverse domains such as military operations, environmental monitoring, rescue operations etc. Each node in a MANET is equipped with a wireless transmitter and receiver, which enables it to communicate with other nodes within its wireless transmission range. However, due to limited wireless communication range and node mobility, nodes in MANET must cooperate with each other to provide networking services among themselves. Therefore, each node in a MANET acts both as a host and a router. Present Intrusion Detection Systems (IDSs) for MANETs require continuous monitoring which leads to rapid depletion of a node?s battery life. To avoid this issue we propose a system to prevent intrusion in MANET using Bayesian model based MAC Identification from multiple nodes in network. Using such system we can provide lightweight burden to nodes hence improving energy efficiency
    corecore