Preview

Smallest Latest Time First Spatial Channel Reuse Scheme for Corman

Powerful Essays
Open Document
Open Document
3080 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Smallest Latest Time First Spatial Channel Reuse Scheme for Corman
SMALLEST LATEST TIME FIRST SPATIAL CHANNEL REUSE SCHEME FOR CORMAN
Ms. J.Chitralega,
M.E- CSE, Nandha College of Technology, Erode. jchitralega21@gmail.com Mr. Dr.S.ArumugamB.E.,M.Sc(Engg).,Ph.D.,
Principal,Nandha College of Technology, Erode arumugamdote@yahoo.co.in Abstract- Spatial Reuse Protocol behaves quite like the Point-to-Point Protocol (PPP) does in a Packet Over SONET (POS) environment. PPP acts as an abstraction layer between a higher level layer 2 technologies such as POS and a layer 1 technology such as SONET/SDH. Layer 1 and high level layer 2 protocols cannot interact directly without having an intermediate low level layer 2 protocol, in the case of DPT the layer 2 protocol is SRP.

Existing work presented Cooperative Opportunistic Routing in MANET (CORMAN) where the nodes use lightweight proactive source routing to determine intermediate node lists for data route (to destination). Data broadcast from upstream node reach downstream nodes are en-routed to its destination by cooperative communication at link and network layers. Nodes running CORMAN, forward data packets in fragments. This increased hop length between source and destination cause nodes at different segment of the route to operate simultaneously. This needs a pipeline of data transportation. Proposed work present Spatial Channel Reuse based Smallest Latest time First (SLF) technique to precise timing node back off. This is produce periodic updates transmitted to other nodes that processed in real-time to enable collaboration. Simulation was carried out with AODV for CORMAN with and without Spatial Channel Reuse based Smallest Latest time First (SLF) to analyze the performance improvement in terms of moderate and high channel utilization that includes collision probability rate.

Index terms: Spatial reuse, co-operative opportunistic routing. I. INTRODUCTION

Wireless channel have varied link qualities for data communication. Broad cast transmission are perceived



References: [1] S. Biswas and R. Morris, “ExOR: Opportunistic Multi-Hop Routing for Wireless Networks,” in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Philadelphia, PA, USA, August 2005, pp. 133–144. [2] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” in Proc. ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), Kyoto, Japan, August 2007, pp. 169–180. [3] I. Chlamtac, M. Conti, and J.-N. Liu, “Mobile Ad hoc Networking: Imperatives and Challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13– 64, July 2003. [4] C. Fragouli, J.-Y. L. Boudec, and J. Widmer, “Network Coding: an Instant Primer,” SIGCOMM Computer Communication Review, vol. 36, pp. 63–68, January 2006. [5] M. K. Marina and S. R. Das, “Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks,” in The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), Lausanne, Switzerland, June 2002, pp. 12–23. [6] S. Murthy, “Routing in Packet-Switched Networks Using Path-Finding Algorithms,” Ph.D. dissertation, University of California - Santa Cruz, 1156 High Street, Santa Cruz, CA 95064, United States, 1996. [7] S. Murthy and J. J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks,” Mobile Networks and Applications, vol. 1, no. 2, pp. 183–197, October 1996. [8] R. Rajaraman, “Topology Control and Routing in Ad hoc Networks: A Survey,” SIGACT News, vol. 33, pp. 60–73, June 2002. [9] Z. Wang, C. Li, and Y. Chen, “PSR: Proactive Source Routing in Mobile Ad Hoc Networks,” in Proc. 2011 IEEE Conference on Global Telecommunications (GLOBECOM), Houston, TX USA, December 2011. [10] S. Yang, F. Zhong, C. K. Yeo, B. S. Lee, and J. Boleng, “Position Based Opportunistic Routing for Robust Data Delivery in MANETs,” in Proc. 2009 IEEE Conference on Global Telecommunications (GLOBECOM), Honolulu, Hawaii, USA, December 2009, pp. 1325–1330.

You May Also Find These Documents Helpful

  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Cited: Solomon, M., & Kim, D. (2013). Fundamentals of Communications and Networking. Burlington: Jones & Bartlett Learning.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Little, M. (1989, October). Goals and Functional Requirements for Inter-Autonomous System Routing: RFC 1126. Retrieved from http://tools.ietf.org/html/rfc1126…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    General assessment of the selected routing protocol identify its functionality and how an algorithm should be developed to the specific routing protocol.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Best Essays

    Mat 540 Final Exam Paper

    • 1350 Words
    • 6 Pages

    [20] McNair, J. and Fang Zhu, “Vertical Handoffs In Fourth-Generation Multi network Environments”, IEEE Wireless Communications, vol.11, no. 3, 2004, pp. 8-15…

    • 1350 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Best Essays

    white paper template 1

    • 963 Words
    • 4 Pages

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 963 Words
    • 4 Pages
    Best Essays
  • Powerful Essays

    Network Simulator

    • 1018 Words
    • 5 Pages

    2. A. Bakre and B. R. Badrinath, “Handoff and system support for indirectTCP/IP,” in Proc. 2nd Usenix Symp. Mobile and Location-IndependentComputing, Apr. 1995.…

    • 1018 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Mobile And Wireless

    • 455 Words
    • 1 Page

    The foundation of any network is some sort of pathway for digital data (bits) to move back and forth between connected agents. Cables, ranging from coaxial to optical, have long dominated this realm. However, wireless is increasingly emerging as a viable alternative to direct physical connection (Stanford University, 2003). Wireless includes many various mediums such as AM, FM, HD and SiriusXM radio. Broadcast and satellite TV, and most, if not all, internet access and cellphones, are now wireless.…

    • 455 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A Mobile Ad hoc Networks (MANETs) stand for a structure of wireless mobile hosts that can dynamically and liberally self organize in to temporary and uninformed network topologies, allocating devices and people to faultlessly communicate without any kinds of pre-existing design of communication structure. The appliances of these networks are extremely necessary in areas like lecture theatres, conference halls, battlefields emergency rescue services, battlefields and other places whenever it’s become very difficult to employment the network infrastructures. In a Mobile Ad Hoc Network the network may experience unpredictable and rapid topology changes because of arbitrarily node movement. Routing paths in Mobile Ad hoc Network possibly have multiple hops, and each node in Mobile Ad hoc Network has the responsibility to perform like a router [1]. So each node in the Ad hoc networking is responsible for forwarding data packets to other nodes [2]. Routing in Mobile Ad hoc Network has been a tough job ever while the wireless mobile networks came into reality because of frequently change in network. Development of dynamic routing protocols is a huge challenge in the design of Ad hoc networks which can proficiently find routes among. These protocols are classified into hybrid, pro-active and reactive routing protocols [3] and the identification of the most appropriate routing protocol to be used depends on various facts which are scalability, traffic and mobility models and quality of service.…

    • 8219 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    A wireless sensor network also known as the adhoc network is used for the purpose of communication, where the communication system is not present especially in natural calamities like earthquakes, floods, or some army or defence purposes. The network comprises of nodes, which communicate with one another using wireless sensors. A wireless connection is developed amidst any two nodes, if the radio broadcast of every node is able to cover one another. If the transmission range is limited then a multihop also might be required, where intermediary nodes transmit the packet till the final node is attained Szu-Chi Wang and S.l. Wei (2004). A strong topology control of the network is important. A wireless sensor network is formed using the amalgamation of wireless powered sensors. Control of the topology through every node for the transmission power adjustment is efficient in increasing the time of the network and raising the capacity of the network. With a decreased transmission power for each node, the range from one node to the other is exposed. In a heterogeneous network the issue intensifies further with varied transmission range where the links that are wireless are not symmetrical in the topology. For a symmetric model, one cannot utilize varied transmission ranges among different nodes. Also if asymmetric links are enabled to be present in the setup, the power of the network setup can be made energy effectual due to variations in the transmission ranges. In this project a wireless asymmetric network is considered with a scattered topology controlled algorithm that allows minimum power for a stationary sensor network, the algorithm congregates instantly. The algorithm is not complex with a bidirectional multi-hop reachability amid two nodes in a given network. Also the interchange amid nodes is restricted to the vicinity, also the algorithm can be scaled to large network arrangements.…

    • 2742 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    One of the advancements in information technology is wireless mobile communication . The most attractive feature of this technology is “anytime-to-anyplace” communication possible, and is now widely applied in the corporate world. This technology system allows increased mobility and extended services to remote areas.…

    • 394 Words
    • 2 Pages
    Satisfactory Essays