• Title/Summary/Keyword: MANET MAC

Search Result 34, Processing Time 0.024 seconds

Performance Evaluation of MAC Protocols with Application to MANET Routing for Distributed Cognitive Radio Networks (분산 무선 인지 네트워크를 위한 MAC 프로토콜의 MANET 라우팅 적용 성능 분석)

  • Kwon, Sehoon;Kim, Hakwon;Kim, Bosung;Roh, Byeong-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.97-106
    • /
    • 2014
  • In this paper, we propose a design method to extend certain cognitive radio (CR) MAC protocols originally proposed only for the one hop applications in distributed CR networks to MANET routing protocols. Among several CR MAC protocols, the opportunistic MAC (called O-MAC) and the opportunistic period MAC (called OP-MAC) are considered, and AODV as MANET routing protocol is used. We implement the protocols using OPNET network simulator, and compare the performances in both MAC and AODV routing environments. With the experiments, we analyze the relationship between MAC and routing performances of the CR protocols.

An Efficient Reactive Routing Protocol based on the Multi-rate Aware MAC for Mobile Ad Hoc Networks (이동 애드 혹 망에서 다중 전송속도를 갖는 MAC 기반의 효율적인 반응형 라우팅 프로토콜)

  • Lee, Jae-Hwoon;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.45-50
    • /
    • 2008
  • Mobile ad hoc networks (MANETs) allow mobile nodes to communicate among themselves via wireless multiple hops without the help of the wired infrastructure. Therefore, in the MANET, a route setup mechanism that makes nodes not within each other's transmission range communicate is required and, for this, the Ad-hoc On-demand Distance Vector (AODV) was proposed as one of the reactive routing protocols well suited for the characteristics of the MANET. AODV uses the hop count as the routing metric and, as a result, a node selects the farthest neighbor node as its next hop on a route, which results in a problem of deteriorating the overall network throughput because of selecting a relatively low data rate route. In this paper, we propose an efficient reactive routing protocol based on the multi-rate aware MAC. Through the simulations, we analyze the performance of our proposed mechanism and, from the simulation results, we show that our proposed mechanism outperforms the existing mechanism.

A Policy-Based Active Framework for the Management of QoS in MANET (MANET에서의 QoS 관리를 위한 정책 기반 액티브 프레임워크)

  • Kim, Kyu-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.119-125
    • /
    • 2007
  • On account of limited resources and diverse topology change. it is difficult to manage MANET and guarantee QoS. In current MANET, QoS grantee is exceedingly significant. However, today's MANET are being concentrately worked on MAC protocols and routing protocols. Thus we proposed a framework for effective management of MANET and supporting QoS using policy based network management paradigm and active network technology. Since this framework employs the policy-based management approach in active network environment, it provides an abstract and autonomous management method to network managers.

  • PDF

Time Slot Exchange Protocol in a Reservation Based MAC for MANET

  • Koirala, Mamata;Ji, Qi;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.181-185
    • /
    • 2009
  • Recently, much attention to a self-organizing mobile ad-hoc network is escalating along with progressive deployment of wireless networks in our everyday life. Being readily deployable, the MANET (mobile ad hoc network) can find its applications to emergency medical service, customized calling service, group-based communications, and military purposes. In this paper we investigate a time slot exchange problem found in the time slot based MAC, that is designed for IEEE 802.11b interfaces composing a MANET. The paper provides a method to maintain the quality of voice call by providing a new time slot when the channel assigned for that time slot gets noisy with interferences induced from other nodes, which belong to the same and/or other subgroups. In order to assess the performance of the proposed algorithm, a set of simulations using the OPNET modeler has been performed assuming that the IEEE 802.11b interfaces are operating under a modified MAC, which is a time slot based reservation MAC implemented in the PCF part of the superframe. In a real-time voice call service over a MANET of a size 500 ${\times}$ 500 meter squares with the number of nodes up to 100, the simulation results are collected and analyzed with respect to the packet loss rate and packet delay. The results show us that the proposed time slot exchange protocol improves the quality of voice call over that of plain DCF.

  • PDF

A Study on Cross-Layer Network Synchronization Architecture for TDMA-Based Mobile Ad-Hoc Networks (TDMA 기반 MANET을 위한 계층교차적 네트워크 동기 아키텍처 연구)

  • Seo, Myung-Hwan;Kim, Joung-Sik;Cho, Hyung-Weon;Jung, Sung-Hun;Park, Jong-Ho;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.647-656
    • /
    • 2012
  • TDMA MAC protocol in MANET requires precise network synchronization between nodes though network topology changes continuously due to node mobility and the effect of propagation environment. In this paper we propose in-band cross-layer network synchronization architecture for TDMA-based MANETs. In the proposed architecture TDMA MAC protocol and proactive routing protocol cooperate closely to rapidly detect network partition and merge caused by node mobility and to precisely maintain network synchronization. We also implement the proposed synchronization architecture in OPNET simulator and evaluate the performance of it in various simulation scenarios. Simulation results show that our architecture stably maintains network time synchronization in both network partition and merge situations.

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

Dynamic Broadcasting Mechanism based on IEEE 802.11 Cross-Layer in MANET (MANET에서 IEEE 802.11 Cross-Layer 기반의 동적 브로드캐스팅 기법)

  • Kim, Jae-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.355-356
    • /
    • 2014
  • 기존의 MANET 환경에서 동작하는 계층화된 데이터 전송 프로토콜은 각 계층이 독립적인 기능을 수행하기 때문에 노드의 이동 상황에 따라 변하는 네트워크 환경을 잘 반영하지 못하고 있다. 본 논문에서는 라우팅 계층과 MAC 계층 간의 상호 작용을 통하여 MANET의 2-홉 거리에 있는 노드 수를 반영하여 더 우수한 성능을 나타내는 Cross-Layer 모델 기반의 브로트캐스트 기법을 제안한다. 본 논문에서 제안하는 Cross-Layer 모델은 IEEE 802.11 MAC 프로토콜을 수정하여 이동 노드 주위의 상태에 따라 브로드캐스트 패킷을 적응적으로 전송하도록 동작한다.

  • PDF

Dynamic Carrier Sensing Threshold Scheme based on SINR for Throughput Improvement in MANET (MANET에서 처리율 향상을 위한 SINR 기반 동적 캐리어 감지 임계값 방법)

  • Lee, Hyun-No;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.319-326
    • /
    • 2014
  • IEEE 802.11 WLAN uses CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) method in MAC(Media Access Control) protocol, and through the carrier sense checks whether other users use the channel during the data transmission to avoid the data collision. Currently, IEEE 802.11 standard recommends the use of a fixed threshold which gives an impact on carrier sensing range. However, the existing scheme using the fixed threshold causes the operation of network to be inefficiency owing to the mobility in MANET(Mobile Ad hoc NETwork). In this paper, we found the better network throughput to be obtained by applying the proposed scheme, which chooses properly the carrier sensing threshold and transmission rate considering SINR(Signal to Interference-plus-Noise Ratio), to the MANET.

A Study on the Context-Awareness Rule-Based Clustering technique for MANET (MANET에서 상황인식 규칙기반에 따른 에너지 보존 클러스터링 기법에 관한 연구)

  • Chi, Sam-Hyun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1041-1047
    • /
    • 2010
  • One of the weaknesses of ad hoc network is that a route used between a source and a destination is to break during communication. To solve this problem, one approach consists of selecting routes whose nodes have the most stable link cost. In this paper proposes a new method for improving the low power distributed MAC. The method is rule-based on the context awareness of the each nodes energy in clustering. The proposed networks scheme could get better improve the awareness for data to achieve and performance on their clustering establishment and messages transmission.

Secure Data Forwarding based on Source Routing in Mobile Ad Hoc Networks (소스 라우팅 기반의 이동 Ad-hoc 네트워크에서 안전한 데이터 전송 방법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1188-1193
    • /
    • 2007
  • This paper proposes a secure data forwarding scheme on source routing-based ad-hoc networks. The scheme uses two hash-key chains generated from a trusted third party to generate Message Authentication Codes for data integrity The selected MAC keys are delivered to the ad-hoc node using a pre-shared secret between the trusted third party and a node. The proposed scheme does not require the PKI, or the provisioning of the pre-shared secrets among the ad-hoc nodes.