Open Access Open Access  Restricted Access Subscription or Fee Access

Implementation of Data Link Layer Protocol Using NS 2

Pragati Patil, B.N. Jagdale

Abstract


Security is a measure concern in wireless sensor network. Many researchers has been focused to improve the security level of a network by implementing various protocols at different layers in the network. This paper mainly focused on implementation of Stop and Wait Protocol using NS 2 at the data link layer of NS 2 architecture. This protocol aims to provide reliable packet delivery which needed in many applications.

 


Keywords


Agent, NS 2, Stop and Wait

Full Text:

PDF

References


Computer networks by Tanenbaum, chapter 4 (only data link protocols).

Pragati Patil, N. Jagdale and M. Penurkar,”A Novel Scheme to Maintain Secrecy in Ad hoc Network “,CiiT International Journal of Wireless Communication.

Al-Sakib Khan Pathan, Hyung-Woo Lee, Security in Wireless Sensor Networks: Issues and Challenges, Feb. 20-22, 2006 ICACT2006, ISBN 89-5519-129-4.

J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva”, A Performance Comparison of Multi-Hop Wireless Network Routing Protocols,” Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’98), October 25-30, 1998,Dallas,Texas,USA,pp.25-30.

J. Jones and M. Atiquzzaman, “Transport Protocols for Wireless Sensor Networks: State-of-the-Art and Future Directions,” International Journal of Distributed Sensor Networks, vol. 3, no. 1, pp.119-133, 2007.

C. Wang, K. Sohraby, B. Li, M. Daneshmand and Y. Hu, “A survey of transport protocols for wireless sensor networks,” IEEE Network, vol. 20, no. 3, pp. 34-40, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.