A Study on Cross Layer MAC design for performance optimization of routing protocols in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 2
Abstract
One of the most visible trends in today’s commercial communication market is the adoption of wireless technology. Wireless networks are expected to carry traffic that will be a mix of real time traffic such as voice, multimedia conferences, games and data traffic such as web browsing, messaging and file transfer. All of these applications require widely varying and very diverse Quality of Service (QoS) guarantees. In an effort to improve the performance of wireless networks, there has been increased interest in protocols that rely on interactions between different layers. Cross-Layer Design has become the new issue in wireless communication systems as it seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network. Wireless multi-hop ad-hoc networks have generated a lot of interest in the recent past due to their many potential applications. Multi-hopping implies the existence of many geographically distributed devices that share the wireless medium which creates the need for efficient MAC and routing protocols to mitigate interference and take full advantage of spatial reuse. Cross-Layer Design is an emerging proposal to support flexible layer approaches in Mobile Ad-hoc Networks (MANETs). In this paper, we present few Cross-Layer MAC design proposals by analyzing the ongoing research activities in this area for optimizing the performance of routing protocols in MANETs.
Authors and Affiliations
P. K. Alima Beebi , Sulava Singha , Ranjit Mane
Mobile Forensic Images and Videos Signature Pattern Matching using M-Aho-Corasick
Mobile forensics is an exciting new field of research. An increasing number of Open source and commercial digital forensics tools are focusing on less time during digital forensic examination. There is a major issue affe...
A Survey on Techniques to Detect Malicious Activites on Web
The world wide web is more vulnerable for malicious activities. Spam–advertisements, Sybil attacks, Rumour propagation, financial frauds, malware dissemination, and Sql injection are some of the malicious activities on w...
A Generic Methodology for Clustering to Maximises Inter-Cluster Inertia
This paper proposes a novel clustering methodology which undeniably manages to offer results with a higher inter-cluster inertia for a better clustering. The advantage obtained with this methodology is due to an algorith...
Quantization Table Estimation in JPEG Images
Most digital image forgery detection techniques require the doubtful image to be uncompressed and in high quality. However, most image acquisition and editing tools use the JPEG standard for image compression. The histog...
A Readiness Evaluation of Applying e-Government in the Society: Shall Citizens begin to Use it?
As people are in the era of the web, most of the society is using networks in their daily task, governments had found, it is crucial to build an electronic entity that was named e-government, to make transactions easier...