A Study on Cross Layer MAC design for performance optimization of routing protocols in MANETs
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 2
Abstract
One of the most visible trends in today’s commercial communication market is the adoption of wireless technology. Wireless networks are expected to carry traffic that will be a mix of real time traffic such as voice, multimedia conferences, games and data traffic such as web browsing, messaging and file transfer. All of these applications require widely varying and very diverse Quality of Service (QoS) guarantees. In an effort to improve the performance of wireless networks, there has been increased interest in protocols that rely on interactions between different layers. Cross-Layer Design has become the new issue in wireless communication systems as it seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network. Wireless multi-hop ad-hoc networks have generated a lot of interest in the recent past due to their many potential applications. Multi-hopping implies the existence of many geographically distributed devices that share the wireless medium which creates the need for efficient MAC and routing protocols to mitigate interference and take full advantage of spatial reuse. Cross-Layer Design is an emerging proposal to support flexible layer approaches in Mobile Ad-hoc Networks (MANETs). In this paper, we present few Cross-Layer MAC design proposals by analyzing the ongoing research activities in this area for optimizing the performance of routing protocols in MANETs.
Authors and Affiliations
P. K. Alima Beebi , Sulava Singha , Ranjit Mane
An agent based approach for simulating complex systems with spatial dynamics application in the land use planning
In this research a new agent based approach for simulating complex systems with spatial dynamics is presented. We propose an architecture based on coupling between two systems: multi-agent systems and geographic informat...
Cyber Romance Scam Victimization Analysis using Routine Activity Theory Versus Apriori Algorithm
The advance new digital era nowadays has led to the increasing cases of cyber romance scam in Malaysia. These technologies have offered both opportunities and challenge, depending on the purpose of the user. To face this...
QoS-based Semantic Micro Services Discovery and Composition using ACO Algorithm
"In this paper, we present a new model of e-Learning platforms based on semantic micro services using discovery, selection and composition methods to generate learning paths. In this model, each semantic micro service re...
Utilization of a Neuro Fuzzy Model for the Online Detection of Learning Styles in Adaptive e-Learning Systems
After conducting a historical review and establi-shing the state of the art of the various approaches regarding the design and implementation of adaptive e–learning systems—taking into consideration the characteristics o...
Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of p...