A Survey: Optimization of Backoff Algorithm for Wireless Mobile Adhoc Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
Media access control (MAC) layer is a very important layer in wireless sensor networks. The media access control data communication protocol sub layer also known as the medium access control. It provide addressing and chhanel acess control mechanism that makes it possible for several terminal or network nodes to communicate within a multipoint network. The mac layer carries the physical address of each device on the network. This address is more commonaly called a device’s Mac address. The MAC address is 48 bit address that’s encoded on each network devices by its manufacture. Backoff algorithm are used to gain access medium with minimum Probability of collision MAC layer recieve Binary Exponential Backoff (BEB) for collision abstention. In the second type of backoff algorithms, backoff periods are changed depending on many factors. The most common factor used is the result of last attempt of transmission by the node requesting channel access.
Authors and Affiliations
Neetesh Nema Mahendra Rai
An Application of Integrated Interface Schema (IIS) Over Multiple WDBS to Enhance Data Unit Annotation
The data unit’s revisits from the fundamental database are typically programmed into the result pages vigorously for human browsing. For the preset data units to be appliance process capable which is necessary for ma...
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Design and Analysis of an Efficient Object Tracking System using Modified Mean Shift Tracking
Object tracking is the process of locating a moving object (or multiple objects) over time using a camera. It has a variety of uses, some of which are: human-computer interaction, security and surveillance, video com...
Multiple Private Keys with NTRU Cryptosystem
Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption...
Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona
Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and...