Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 12, Issue 2
Abstract
Mobile Ad-hoc Networks (MANETs) are special kind of wireless networks with no centralized control. They are ideal candidate for several real world applications where network need to be established on the fly e.g. disaster hit areas, hospitals, military surveillance etc. Researchers have been actively working in this area for a decade or so to make this concept a reality. MANETs differ from conventional fixed networks and therefore pose several challenges to the researchers working in the area. Among many others, access to shared medium is the major problem in MANETs. In such networks MAC layer protocol plays an important role in efficient utilization of shared media in distributed fashion. At the MAC layer we have three contradicting requirements, Maximize channel utilization, Minimize Control overhead and Fairness. Multi-Channel MAC protocols are considered is the most suitable solution to achieve the desired objectives but channel assignment and reservation in a distributed fashion is still a big challenge. In this paper, we have proposed a MultiChannel scheme to address the problem of channel assignment the proposed scheme is Nodeid based. The proposed Scheme has been compared with conventional single channel scheme using ns-2 simulation and results shows that the proposed technique gives better performance
Authors and Affiliations
Muhammad Asif
Network Layer Attacks: Analysis & Solutions, A Survey
Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, s...
Fuzzy Inference Rule Generation Using Genetic AlgorithmVariant
Abstract: In essence of fuzzy inference system (FIS) for classification, Genetic algorithm (GA) which is anoptimal searching technique is used for generation rules in the proposed work. This paper develops an FIS withrul...
Improving Cloud Security Using Data Mining
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes...
Secured Source Anonymous Message Authentication UsingWireless Sensor Network
Abstract: The secured exchange of message was the main concern. To overcome this, message authenticationschemes were developed, to maintain the privacy of message. Message authentication schemes are based onsymmetric key...
Design of Lane Detecting and Following Autonomous Robot
This paper presents a robot which is designed to autonomously navigate through a track by detecting lanes and centering itself between them by using a camera. We are proposing basic and easy algorithm for track...