A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing and chhanel acess control mechanism that makes it possible for several terminal or network nodes to communicate within a multipoint network. The mac layer carries the physical address of each device on the network. This address is more commonaly called a device’s Mac address. The MAC address is 48 bit address that’s encoded on each network devices by its manufacture. Backoff algorithm are used to gain access medium with minimum Probability of collision MAC layer recieve Binary Exponential Backoff (BEB) for collision abstention. In the second type of backoff algorithms, backoff periods are changed depending on many factors. The most common factor used is the result of last attempt of transmission by the node requesting channel access.
Authors and Affiliations
Neetesh Nema Mahendra Rai
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...
Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...
Design of Punctuality Enhanced Bus Transportation System Using GSM and Zigbee
Public traffic system depends mainly on driver’s manual operation, which will encounter many problems regarding the punctuality of the bus’s arrival and departure of the bus at bus stations. Paper proposes a supervi...
Evaluating Packet Hiding Methods In Wireless Networks
This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high prio...
Analysis of Face Recognition using PCA and Neural Networks
Face Recognition System could be a laptop application that is employed to spot or verify someone during a digital image, supported digital image process and is a vigorous space of analysis. The Face Recognition Syste...