Developing a Wireless Ad-Hoc Network using MAC Schemes
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
A mobile user can connect to a LAN by using a wireless connection which is known as Wireless LAN (WLAN). WLAN uses high frequency waves instead of wire to communicate between nodes. Here signals are of limited range. WLANs combine data connectivity with user mobility, and, through simplified configuration, enable movable LANs. IEEE 802.11 standard provides technical specifications for the wireless interfaces. There are two modes of operations in WLAN.One is the presence of control module often called as based station or IEEE 802.11 calls them access points and the second one is ad hoc or peerto- peer connectivity. Three basic medium access control (MAC) mechanisms have been defined for IEEE 802.11: the mandatory basic method based on a version of carrier sense multiple access with collision avoidance (CSMA/CA), an optional method avoiding the hidden terminal problem and the third one is a contention-free polling method. The mandatory MAC mechanism and the optional method of IEEE 802.11 are known as distributed coordination function (DCF) whereas the third method is called as point coordination function (PCF). DCF is CSMA/CA with binary exponential backoff algorithm. DCF with optional RTS/CTS scheme in 802.11 MAC protocol avoids the problem of hidden terminals. In this paper, we have studied the 802.11 wireless LAN (WLAN) and the working of DCF in wireless LANs (WLANs).
Authors and Affiliations
Pavan Kumar Vishvakarma
A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network
The handwritten symbol recognition plays an important role in present communication systems. In the data communication systems, all the data have to be recorded, encoded and will be communicated with other systems. Prese...
Evaluation of Traffic Monitoring Wireless Sensor Network System under the Effect of Various Climatic Conditions
Wireless Sensor Networks for real time traffic surveillance system in an Intelligent Transportation Systems which is currently considered to be challenging application area for this emerging technology. The promise of an...
Closed Regular Pattern Mining Using Vertical Format
Discovering interesting patterns in transactional databases is often a challenging area by the length of patterns and number of transactions in data mining, which is prohibitively expensive in both time and space. Closed...
BASE STATION DRIVEN ROUTING PROTOCOL EVALUATION USING TOSSIM
Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz. data collection and data dissemination protocols. This paper compares two collection protocols: Base S...
Impact of Protocol Switching Strategy in Delay Tolerant Networks
Delay-Tolerant Networks (DTNs) are sparse dynamic wireless networks in which a complete end-to-end path from the source to the destination does not exist. In this context, conventional mobile adhoc routing schemes would...