ROUTING THROUGH CROSS LAYER APPROACH FOR WIRELESS MAC LAYER NETWORKS
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 3
Abstract
Wireless mesh networks (WMNs) are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and maintaining the mesh connectivity. WMNs are comprised of two types of nodes: mesh routers and mesh clients .The link asymmetry exist because of the heterogeneous transmission range of these two nodes. This heterogeneity degrade the network performance dramatically this paper introduce a new approach called cross-layer approach for mesh access networks to improve network performance by overcoming the challenges. In this approach the unidirectional link at the network layer and channel reservation mechanisms at the mediumaccess control (MAC) layer using topological information collected in the network layer are eliminated. With the theoretical analysis and experimental evaluation, we validate that our approach can achieve better performance with existing approaches.
Authors and Affiliations
B Sudeep Kumar, Dr. M. Sailaja
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...
Survey on Encryption and Data Hiding for Secure Data Transmission
There are many possible ways to transmit data to destination. However one of the main issues with sending data over the internet is its security. In which the confidential data can be stolen or hacked in many ways. S...
A Review of Various Techniques of Web Content Mining For HTML and XML Contents
World Wide Web is the largest source of information. Most of the data on the web is dynamic and is in unstructured form. It is becoming difficult to get the relevant data from the web. Data Mining is the field of com...
Network Coding Equivalent Content Distribution (NCECD) Scheme in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks that However has been limit...
Design Of Ternary Logic Gates Using CNTFET
This paper presents a novel design of ternary logic gates like STI,PTI,NTI,NAND and NOR using carbon nanotube field effect transistors. Ternary logic is a promising alternative to the conventional binary logic design...