Transmission Power Control in Wireless ad hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 2
Abstract
In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport are needed. This work is concerned with conceptualization the power control problem and exhibit a design situated at the network layer. Transmission power control is important because of the fundamental nature o f the wireless network that it is interference limited. Transmission power control has the potential to increase a network’s traffic carrying capacity, reduce energy consumption, and reduce the end-to-end delay. We start by postulating general design principles for power control based on the effect of transmit power on various performance metrics.
Authors and Affiliations
Morukurthi Sreenivasu, Sivaneni Devi
A Brief Servey Of Rfid Devices And Its Security Protocols
Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into opera...
Improving QOS Using Virtual Topology Design for OBS Switching Network
In WDM Networks, OPS and OBS provides efficient communications for many internet applications such as high performance scientific computations, video conferencing by combining hundreds of high speed wavelength channe...
Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering
Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to informa...
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...
A Framework for Refusal DDOS Attack Location Procuring Into Account Multivariate Relationship Assessment
This paper discussed the consequences of MCA on the Distributed DoS discovery and recommends an illustration, a covariance examination model for recognizing SYN flooding assaults. The impersonation final results demo...