Optimized Pessimistic Fibonacci Back-off Algorithm (PFB)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 9
Abstract
MANET is a self-directed system consisting of mobile nodes, which can be either routers and/or hosts. Nodes in MANET are connected by wireless links without base stations. The Backoff algorithm considered as a main element of Media Access Control (MAC) protocol, which is used to avoid collision in MANET’s. The Fibonacci Backoff algorithm and the Pessimistic Fibonacci Backoff are proposed to improve network performance depending on contention window size. This research introduces a new hybrid Backoff algorithm called Pessimistic Fibonacci Backoff (PFB) Algorithm which merges the two previous algorithms in order to find the most proper contention window sizes that reduce collisions as much as possible. This research takes into consideration and evaluates each of the following main measurements: Packet delivery ratio, normalized routing load and end-to-end delay. Based on the extracted simulation results, PFB algorithm outperforms Pessimistic Linear-Exponential Backoff (PLEB) by up to 76%,40.41%, 31.88% in terms of Packet delivery ratio, end-to-end delay and normalized routing load respectively, especially in the sparse environments. All of the simulation results are obtained by the well-known NS-2 Simulator, version 2.34, without any distance or location measurements devices.
Authors and Affiliations
Muneer Yassein, Mohammed Alomar, Constandinos Mavromoustakis
Joint Operation in Public Key Cryptography
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become inte...
An Adaptive Approach to Mitigate Ddos Attacks in Cloud
Distributed denial of service (DDOS) attack constitutes one of the prominent cyber threats and among the hardest security problems in modern cyber world. This research work focuses on reviewing DDOS detection techniques...
Performance Analysis of UMTS Cellular Network using Sectorization Based on Capacity and Coverage
Universal Mobile Telecommunications System (UMTS) is one of the standards in 3rd generation partnership project (3GPP). Different data rates are offered by UMTS for voice, video conference and other services. This paper...
WQbZS: Wavelet Quantization by Z-Scores for JPEG2000
In this document we present a methodology to quantize wavelet coefficients for any wavelet-base entropy coder, we apply it in the particular case of JPEG2000. Any compression system have three main steps: Transformation...
Automatic Facial Expression Recognition Based on Hybrid Approach
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years. Several techniques have emerged in order to improve...