Opportunistic Transmission Scheduling Using Medium Access Control Protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 5
Abstract
Mobile underwater networks with acoustic communications are confronted with several unique challenges such as long propagation delay, high transmission power utilization, and node mobility. Propose the delay-aware opportunistic transmission scheduling (DOTS) algorithm designed for underwater mobile sensor networks. It uses passively obtained local information to increase the chances of concurrent transmissions while reducing the likelihood of collisions. Propose a simple performance enhancement mechanism that permits multiple outstanding packets at the sender side enabling multiple transmission sessions significantly improves the overall throughput. Proposed a MAC protocol called DOTS that alleviates limitations caused by the long propagation latency and the severely limited bandwidth of acoustic communications. DOTS can effectively exploit temporal and spatial reuse by using local information. In DOTS, each node learns neighboring nodes’ propagation delay information and their expected transmission schedules by passively overhearing packet transmissions. DOTS aimed to achieve better channel utilization by harnessing both temporal and spatial reuse. Our simulation results document that DOTS provides fair medium access even with node mobility. A channel access protocol for ad-hoc underwater acoustic networks. The protocol saves transmission energy by avoiding collisions while maximizing throughput. This protocol achieves a throughput several times higher than that of the Slotted FAMA, while offer related savings in energy.
Authors and Affiliations
Nandhini Selvam, Karthick Krishnamoorthy
Vulnerability Assessment and Penetration Testing for Url’s Using Different Sql’s Injections Manually
vapt (vulnerability assessment and penetration testing) provides a critical observation of organization operating systems, web servers, database servers, access points and loop holes or back doors. It gives a more detai...
Hardware Implementation of Mobile Robot for Tele-Operation
A device which is controlled by a human operator remotely is called a tele-operator. In this paper, the application on system can be developed by the programming Language Java. The implementation of two tele-operation m...
Detailed Investigations on a A Hybrid Cloud Approach for Secure Authorized Deduplication
Data deduplication is one of important data compression techniques which is for eliminating duplicate copies of repeating data, and has been widely used in cloud storage in order to reduce the amount of storage space an...
Evaluating the Effect of Modified Bitumen after Short-Term Aging using FTIR Spectroscopy & SEM
In the developing country like India, growth of urbanization is a vital process ultimately leads to the vehicle growth and thus the load on the pavement increases which leads to distress of the pavement. Major problem i...
Comparative Analysis of Energy-Efficient Protocol LEACH, PEGASIS and GA-PEGASIS in Wireless Sensor Networks
Wireless Sensor Network is a collection of small sensor nodes with ability to sense, compute and transmit data that are deployed to observe a physical environment. Data dissemination and gathering protocols design for W...