Open Access Open Access  Restricted Access Subscription or Fee Access

MANET Based, Cross layer Monitoring Process to Improve the Performance of IEEE 802.11

S. Usha, Dr.S. Radha

Abstract


Mobile ad hoc networks are this newly evolved networking concept primarily due to the increase in use of wireless technology for communication. But the MANET concept faces issues over resource sharing, volatility of the network and erroneous data transmission. Thus a new cross layer design approach is being proposed where service discovery and routing functions are coupled for optimization. Congestion avoidance adopted due to the noise resulting from interference rather than from actual congestion or packet loss results in low bandwidth utilization. The new approach adopted in this paper will try and overcome these issues by sharing the information among various levels and minimizing data retransmissions and losses by making appropriate responses for the events.

Keywords


MANET, Congestion, Packet Loss, Wireless Networks and Cross Layer

Full Text:

PDF

References


G. Bianchi, ―Performance analysis of IEEE802.11distributed coordination function,‖ IEEE J. Select. Areas Commun., vol. 18, pp. 535–547,Mar. 2000.

S. Wieth¨olter and C. Hoene, ―Design and verification of an IEEE 802.11e DCF simulation model in ns-2.26,‖ Technische Universit¨at Berlin, Tech. Rep. TKN-03-019, Nov. 2003.

A. Markopoulou, F. Tobagi, and M. Karam, ―Assessing the quality of voice communications over Internet backbones,‖ IEEE Trans. Networking,vol. 11, pp. 747–760, Oct. 2003.

G.-S. Ahn, A. T. Campbell, A. Veres, and L.-H. Sun, ―Supporting service differentiation for real-time and best-effort traffic in stateless wireless adhoc networks (SWAN),‖ IEEE Trans. Mobile Computing, vol. 1, pp. 192–207, 2002.

M. Ergen and P. Varaiya, ―Throughput analysis and admission control in IEEE 802.11a,‖ Mobile Networks and Applications, MONET Special Issue on WLAN Optimization at the MAC and Network Levels, to appear.

A. Zaki and M. El-Hadidi, ―Throughput analysis of IEEE 802.11 DCFunder finite load traffic,‖ in Proc. First International Symposium onControl, Communications and Signal Processing, 2004, pp. 535–538.

G. Cantieni, Q. Ni, C. Barakat, and T. Turletti. ―Performance analysisunder finite load and improvements for multirate 802.11b,‖ ElsevierComputer Commun. Journal, vol. 28, pp. 1095-1109, June 2005.

O. Tickoo and B. Sikdar, ―A queueing model for finite load IEEE802.11 random access,‖ in Proc. IEEE International Conference onCommunications, vol. 1, June 2004, pp. 175–179.

Wirless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) enhancements for Qualityof Service (QoS), IEEE std 802.11e-draft ed., IEEE.

Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misebehavior in mobile ad hoc networks. In Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Boston, USA, 2000; 255–265.

Buchegger S, Le Boudec J-Y. Performance analysis of the CONFIDANT protocol:cooperation of nodes—fairness in dynamic ad-hoc networks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.

Deng H, Zeng Q, Agrawal DP. SVM-based intrusion detection system for wireless ad hoc networks. In Proceedings of the IEEE Vehicular Technology Conference (VTC’03), Orlando, 2003,Vol. 31, pp 2147–2151.

Rituparna C, Nabendu C. IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network. In Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM’07, 2007; 179–184.

Rachedi A, Benslimane A. A secure architecture for mobile ad hoc networks. In Proceedings of International Conference on Mobile Ad-Hoc and Sensor Networks (MSN’06), Lecture Notes in Computer Science, Vol. 4325. Hong Kong, China, 2006; 424–435.

Huang Y, Lee W. A cooperative intrusion detection system for ad hoc networks. In Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Virginia, USA, 2003; 135–147.

UC Berkeley and USC ISI, The network simulator ns-2, Part of the VINT project. Available from http://www.isi.edu/nsnam/ns, 1998.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.