Modeling and Analysis of Collision Avoidance MAC Protocol in Multi-Hop Wireless Ad-Hoc Network
نویسندگان
چکیده
. The absence of centralized administration, multi-hop transmission, and the nature of wireless channels pose many challenging research area in Mobile Ad hoc NETworks (MANETs). In this paper, a collision avoidance Medium Access Control (MAC) protocol was used for the modeling and analysis of multi-hop wireless ad hoc network, in which RTS/CTS/DATA/ACK handshake and Exponential Increase Exponential Decrease (EIED) back-off mechanism were adopted. A simple n-vertex undirected graph G(V, A) is used to model the topology of MANET while three-state Markov chain was used to model channel state and node state of MANET. Simulation results show that throughput increases with increase in persistent probability, sensing range and length of a DATA frame. Also throughput has a peak value at some point of the persistent probability, sensing range and length of a DATA frame, which is influenced by the number of nodes. In the other hand throughput increases along with the increase of transmission range for some values, then it start decreasing with increase in transmission range. Furthermore throughput decreases with increase in the number of nodes and back-off time. In order to validate the proposed models, a performance comparison of the throughput of existing model with the throughput of the proposed model by considering persistent probability, sensing range, transmission range, length of DATA transmission and back-off time was carried out. The overall results show that the proposed model achieve better throughput than the existing model.
منابع مشابه
A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملThroughput Improvement in Wireless Multi-Hop Ad-Hoc Networks Using Load Control
IEEE 802.11 MAC is the most commonly used protocol in multi-hop ad-hoc networks which need no infrastructure. In multi-hop ad-hoc networks based on IEEE 802.11, since nodes try transmitting their packets at every possible slot, there is a high packet loss probability. This degrades network performance attributes such as throughput and fairness. In this paper, we focus on achieving the maximum t...
متن کاملCollision Avoidance in Multi-Hop Ad Hoc Networks
Collision avoidance is very important in contentionbased medium access control protocols for multi-hop ad hoc networks due to the adverse effects of hidden terminals. Four-way sender-initiated schemes are the most popular collision-avoidance schemes to date. Although there has been considerable work on the performance evaluation of these schemes, most analytical work is confined to singlehop ad...
متن کاملA Multiple Access Protocol with Collision Avoidance and Multi- CTS Candidates for Multi-channel Ad-hoc Networks
-The multi-channel technique is a powerful scheme to improve the capacity of wireless network. CSMAC/CA based medium access protocols use carrier sense and RTS-CTS handshake to reduce the collisions of the share channel. In this paper, we propose a new MAC protocol for multi-hop ad hoc networks, which combines the CSMA/CA and Multi-channel techniques. And we call it Multiple Access with Collisi...
متن کاملCollision Resolution MAC Protocols for Wireless Ad Hoc Networks
In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (base station or access point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (time division multiple access), is difficult to implement i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJCNIS
دوره 3 شماره
صفحات -
تاریخ انتشار 2011