Developing a Wireless Ad-Hoc Network using MAC Schemes
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
A mobile user can connect to a LAN by using a wireless connection which is known as Wireless LAN (WLAN). WLAN uses high frequency waves instead of wire to communicate between nodes. Here signals are of limited range. WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs. IEEE 802.11 standard provides technical specifications for the wireless interfaces. There are two modes of operations in WLAN.One is the presence of control module often called as based station or IEEE 802.11 calls them access points and the second one is ad hoc or peerto- peer connectivity. Three basic medium access control (MAC) mechanisms have been defined for IEEE 802.11: the mandatory basic method based on a version of carrier sense multiple access with collision avoidance (CSMA/CA), an optional method avoiding the hidden terminal problem and the third one is a contention-free polling method. The mandatory MAC mechanism and the optional method of IEEE 802.11 are known as distributed coordination function (DCF) whereas the third method is called as point coordination function (PCF). DCF is CSMA/CA with binary exponential backoff algorithm. DCF with optional RTS/CTS scheme in 802.11 MAC protocol avoids the problem of hidden terminals. In this paper, we have studied the 802.11 wireless LAN (WLAN) and the working of DCF in wireless LANs (WLANs).
Authors and Affiliations
Pavan Kumar Vishvakarma
A Review: An Efficient Review of Phonetics Algorithms
Phonetics is the speech sound that occurs in all human languages. Phonetics plays a important role in improving our communication. It denotes all sound- changes effected for ease of pronunciation. This paper reviews the...
EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES
Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...
A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of...
Vision Based Gesture Recognition for Alphabetical Hand Gestures Using the SVM Classifier
In this paper we discuss how a Gesture Recognition system for Alphabetical Hand Gestures is built. The main motive was to develop a system that can simplify the way humans interact with computers. The system is designed...
A Survey of Cyber Crimes
Now a days Cyber Crime is the most significant challenges in India .Cyber Crimes are generally referred as criminal activities that use computers or networks. It can range from fraud to unsolicited emails (spam). It can...