Document 13715156

advertisement
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
An Adaptable MAC Protocol in MANETs : A Democratic Approach
P.K.Srinivasan and Pallapa Venkataram∗
Protocol Engineering and Technology Unit,
Electrical Communication Engineering,
Indian Institute of Science, Bangalore-560 012, India
E-mail:{pks, pallapa}@ece.iisc.ernet.in
Abstract
Mobile ad-hoc networks (MANETs) have recently drawn significant research attention since they offer unique
benefits and versatility with respect to bandwidth spatial reuse, intrinsic fault tolerance, and low-cost rapid deployment.
This paper addresses the issue of delay sensitive realtime data transport in these type of networks. An effective QoS
mechanism is thereby required for the speedy transport of the realtime data. QoS issue in MANET is an open-end
problem. Various QoS measures are incorporated in the upperlayers of the network, but a few techniques addresses
QoS techniques in the MAC layer. There are quite a few QoS techniques in the MAC layer for the infrastructure based
wireless network. The goal and the challenge is to achieve a QoS delivery and a priority access to the real time traffic
in adhoc wireless environment, while maintaining democracy in the resource allocation. We propose a MAC layer
protocol called ”FCP based FAMA protocol”, which allocates the channel resources to the needy in a more democratic
way, by examining the requirements, malicious behavior and genuineness of the request. We have simulated both the
FAMA as well as FCP based FAMA and tested in various MANET conditions. Simulated results have clearly shown
a performance improvement in the channel utilization and a decrease in the delay parameters in the later case. Our
new protocol outperforms the other QoS aware MAC layer protocols.
Key-Words
1
: QoS, FAMA, FCP, Priority, node, MANET.
Introduction
that is shared by all the nodes that are in the same
radio communication range,and the radio frequency
bandwidth is limited. The packet collisions are unavoidable due to the fact that traffic arrivals are random and there is non zero propagation time between
transmitters and receivers. Therefore medium access
control protocols are used to co ordinate access to
the single channel in the network. Ad hoc networks
being decentralized various QoS measures has to be
implemented in order to support the Multimedia/real
time data. Many of MAC layers protocols have been
developed for the wireless ad hoc networks concentrates on enhancement of throughput and they do
not support the Multimedia applications. Sufficient
QOS parameters has to be specified for supporting
the real time data. The QoS parameters specified for
the multimedia wireless networks is not sufficient for
A MANET (Mobile Ad Hoc Network) is an autonomous collection of mobile hosts that communicate over relatively bandwidth constrained wireless
links. Since the nodes are mobile, network topology may change rapidly and unpredictably over time.
The ad hoc wireless networks are generally decentralized, where all network activity including discovering
the topology and delivering messages must be executed by nodes themselves. The MANET can be set
up anywhere and anytime as they are reducing complexities of infrastructure setup and administration
without having infrastructure (such as a base station
in a cellular technology or an access point in a wireless local area network). There is only one medium
∗
Corresponding Author
1
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
possible in this frame work. In[4], the Differentiated
distributed co-ordination function (DDCF) approach
will establish a layered approach of QoS frame work.
A node in higher layer is given more priority because
it will take more responsibilities in administrating
the network and relaying packets between the
clusters and hence receives heavier traffic loads. The
differentiated channel access mechanism is achieved
by varying the channel contention parameters
(Eg,.IFS,CW). The IEEE 802.11e AEDCF function
incorporates flow based different channel contention
parameters to achieve the performance but suffers
with hidden node problems. Various other QoS
aware MAC protocols are specified in the literature
which basically modifies any one of the channel
contention parameters of the IEEE 802.11 to achieve
the performance
the ad hoc scenario.
1.1
Mobile Multimedia Applications
For smooth running of mobile multimedia application
four QoS parameters: bandwidth, cost, delay bounds,
and security, are appropriately set (or allocated) so
that throughout the application the end-user gets the
data as per the user requirement. These factors are
the important parameters for making adaptation decisions in MANETs. Among these four parameters,
bandwidth is the most important measure and is usually monitored in any type of application. Cost and
security factors are rarely mentioned in literatures
about mobile applications, and it is difficult to measure them too. Delay bound is another important
measure, especially for mobile multimedia applications, since streaming media is very sensitive to latency. Besides bandwidth and latency, error rate is
also a very important measure for mobile multimedia
applications because multimedia compression is very
sensitive to errors. Some of the key requirements of
QoS adaptation for mobile multimedia applications
are: automated data format adaptation without user
intervention, graceful quality degradation, seamless
hand offs across networks during roaming, and high
QoS with low jitter, delay, and guaranteed bandwidth. To fulfill these requirements, a lot of different
approaches can be applied to get the QoS adaptation
for mobile multimedia.
1.2
1.3 Proposed Work
We propose a new QoS aware MAC protocol, called
FCP-FAMA, which takes into consideration the requests of the nodes (or mobile users) for the resources
from time to time and schedule the dedicated allocation of the resources to each node. Here, the protocol
is adaptive during the allocation of channel resources
with a democratic approach. The FAMA is used as a
basic channel contention protocol and the FCP over
rides on the FAMA protocol as a centralized authority in allocation of the channel resources.
QoS aware MAC Protocols in MANET and
their limitations
1.4 Organization of the rest of the paper
There are various QoS aware MAC layer protocols
given in the literature as applicable to the adhoc
networks. The MPC-MAC protocol[3] implements
PCF in adhoc networks and gives a QoS approach
by introducing Clustering among the group of nodes
and selecting a mobile point coordinator(MPC) node
which is rich in resources. The MPC as proposed
will create a virtual infrastructure on the fly in the
group of nodes and is maintained dynamically by
periodically broadcasting hello messages. Despite
the benefits of MPC, the protocol does not discuss
an adaptable way of resource allocation among the
group of nodes. More over a single point of failure is
The following sections are organized as follows. Section 2 describes the FCP-FAMA protocol, Section 3
describes the analysis of the protocol and Section 4
gives the simulation results and finally Section 5 concludes the paper.
2 Proposed FCP based FAMA Protocol
The FCP-FAMA protocol runs in a centralized scenario. All the nodes which are in radio range
will select a node which is rich in resources like transmitting power, buffer capacity, and other channel resources. Figure 1 shows the inclusion of FCP-FAMA
2
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
any hidden sender that did not hear the RTS being
acknowledged. This is called as ”CTS Dominance”.
When a station with data to send fails to acquire
the floor or detects the floor being held by another
station, it must reschedule its bid for the floor.
This is done using different persistence and backoff
strategies.
2.2 Floor Control Protocol(FCP)
Figure 1: TCP/IP Model with QoS architecture using FCPFAMA
The Floor Control Protocol [2] is the prime protocol
used for the QoS management. Floor control is
a means to manage joint or exclusive access to
shared resources in a (multiparty) network conferencing environment.
The protocol primarily
assigns floor(resources) for the prioritized nodes.
The conference applications often have shared
resources such as right-to-talk, allowing genuine and
justified user get the floor, etc., In many cases, it is
desirable to be able to control who can provide input
(send/write/control, depending on the application)
to the shared resource in the MANETs. Floor
control enables applications or users to gain safe and
mutually exclusive or non-exclusive input access to
the shared object or resource. The floor is an individual temporary access or manipulation permission
for a specific shared resource (or group of resources).
The FCP is primarily responsible for the handling
of the requests from the nodes and scheduling the
resources according to the priority of the requests.
The FCP concept has been extended and few more
features have been added in FCP-FAMA protocol.
in the TCP/IP model. The MAC protocol FAMA is
used as a basic channel contention mechanism. The
FCP governs the allocation of the channel(floor) to
the nodes according to the QoS layed parameters.
Before we discuss the protocol, we describe FAMA
and FCP which are used in the protocol.
2.1
Floor Acquisition Multiple access Protocol(FAMA)
FAMA[1] is a MAC layer protocol which
requires a station who wishes to send one or more
packets to acquire the floor (Channel) before transmitting the packet train. The floor is acquired
using an RTS-CTS exchange multiplexed together
with the data packets in such a way that, although
multiple RTSs and CTSs may collide, data packets
are always sent free of collisions. A station sends
a CTS signal after receiving an error-free RTS addressed to it. When a station receives an error-free
CTS, it knows that the floor has been acquired by a
station to whom the CTS is addressed. After floor
acquisition, either the floor holder or any of the
receivers addressed by the floor holder are able to
send data packets and acknowledgments, without
collisions over the channel. This is accomplished
by forcing stations that do not have the floor to
wait for a predefined minimum amount of time (at
least twice the maximum propagation delay) before
being able to bid for the floor. To ensure that floor
acquisition is enforced among competing senders
hidden from one another and who have requested
the floor (i.e., sent an RTS), the CTS sent by a
receiver is guaranteed to last long enough to jam
2.3 FCP-FAMA Protocol
FCP-FAMA is a QoS and malicious behaviour aware
MAC protocol. The FCP runs at the Cluster head
(CH) of a given MANET, where each of the mobile
hosts runs FAMA at the MAC layer. The Mobile
hosts(or nodes) will start contending for the channel using the FAMA contention, during this channel contention, each node will monitor their throughput, delay parameters and update their available resource parameters. Each node has a traffic based
QoS parameters and these parameters are compared
3
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
FCP in the CH in their respective resource request
frames. The resources here is primarily the channel
duration and bandwidth. Normal FAMA based contention is used for the delivery of the request frames.
2. Upon collecting the request frames during a certain period of time, the FCP schedules the forthcomming channel duration for the dedicated allocation to
the nodes. The scheduling process takes in consideration the genuineness and the urgency of the request.
Malicious behavior is detected and energy levels also
is considered. Now the task of the FCP is to convey
this scheduling information to all the nodes in a ’time
scheduling’ frame.
3. This ’time scheduling frame’ is broadcasted to the
nodes by the CH, by using the FAMA channel contention mechanism as like any other node.
4. The nodes upon receiving the ’time scheduling
frame’ will now wait for their turn of transmission
and transmits/receive the data packets for the duration of the time alloted. During a node’s transmission, other nodes will defer their channel access. The
CH will cumulatively acknowledge for all the data
packets received to save the channel contention overheads. The nodes will thus achieve their QoS requirements. The nodes will get a dedicated access to
the resources propositional to the deficiency in their
service as well as the priority of the traffic it holds.
Thus the FCP-FAMA protocol is more adaptive in
the resource allocation process. The democracy is
achieved because each node is getting the share of
resources depending upon their request.
5. After this dedicated channel allocation is over,
all nodes as usual, will content for the channel using
FAMA and this process repeats over a frame duration
of time. Here we have proposed that the nodes upon
receiving the time scheduling frame and waiting for
their chance of transmission will also remember the
stage at which they were during the FAMA channel
contention process and this will be usefull when the
nodes resumes with normal channel contention after
the dedicated channel allocation process is over. The
FCP over FAMA thus achieves the service differentiation among the nodes. The FCP at CH is given
in the algorithm.1. The tuple (pi , ri ) gives the priority of the node sending a particular class of data,
and resource requested for the same. Ti indicates the
against the available resources from time to time. If
a deficiency is found in service, the node creates a
frame consisting of information about the deficiency
in the obtained resources. This deficiency information frame is sent to the FCP in the CH using the normal FAMA contention. The CH receives such frames,
from time to time from all the nodes. A node may
or may not have a service deficiency at a particular
amount of time. Thus a set of frames received by the
CH will vary. The FCP at the CH taking various parameters into consideration will frame the requests.
Once final decision has been taken on channel allocation, FCP allocates accordingly in co-ordination with
FAMA. The FCP will take into consideration about
the urgency, genuineness, fairness greediness, malicious nature, while allocating the resources to any
node. The requested resources are scaled accordingly
keeping the nodes requests relations.
2.4
Function of FCP module
The FCP module of the protocol runs at the application layer of the protocol stack and co-ordinates
with the FAMA at the MAC layer. FCP collects the
transmission requirements from the FAMA, and also
the QoS parameters from the applications at the application layer. Besides that the FCP collects the
information on the malicious behaviour of the node
like greediness, misappropriation of the allotted resources, intentionally dropping the packets etc., The
FCP algorithm is given in Algorithm 1. The FCP
facilitates the dedicated access for the resources.
We have also added the energy management
requirements for the FCP decision making. The FCP
takes this information and computes the priority for
a given n applications at an instant of time. The
Algorithm 2. gives the priority algorithm.
2.5
Description of FCP-FAMA Protocol
The FCP runs at the CH and is responsible for the
following.
1. From time to time, the nodes in the cluster will
send the MAC frames comprising of request for the
resources. The nodes calculate the deficiency in their
alloted resources by comparing with the user set QoS
requirements and this difference is intimated to the
4
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
Figure 2: Resource request frame
Figure 3: Time Scheduling Frame
Algorithm 1 FCP at Cluster head
Begin
if (received Packet from nodei =Resource Request
frame(pi , ri )) then
Generate Ui //
set Ti = Ui pP
i ri
set Tsum = i pi ri
end if
if (CHnode.cts is received) then
Tsum
set Tscale =
Tmax
(pi ri )
set slot for node i ;Tslot =
Tscale
P
2.6 FCP-FAMA Protocol System Parameters
set Tf rame = Tslot // QoS frame Scheduling
send Tf rame
The following system parameters are used by the
end if
FCP based FAMA protocol.
resource to be alloted to ith request. Ui which is the
greediness and misappropriation parameter is calculated based on the previous history of the allotted
resources. Tsum will give the net resources demanded
from all the nodes. Tscale will determine a scaling factor which depends upon the available resource Tmax .
Thus each nodes request is scaled accordingly. This
ensures a democratic allocation of resources with priority still maintained among the nodes. The time
scheduling frame is send accordingly.
Algorithm 2 Node FCP process
Begin
if (received Packet from CHnode=Tf rame ) then
if (present time t= node time (Tslot )) then
copy the state of the node
Transmit/Recieve packets
else
copy the state of node
Wait for the time slot in the Tf rame
else
Call REMOTE() of FAMA
end if
end if
Resource Request frame
This frame is generated from the nodes. It comprises
of the preamble, CRC check sum, MAC data and
PLCP Header consisting of source MAC address as
given in Figure.2. The MAC data comprises of packet
priority and insufficiency parameter.
Time Scheduling Frame
This frame is generated upon deciding the resource
allocation parameters by the FCP at the Clusterhead. It consists of Preamble and PLCP Header,
CRC check sum. The MAC data comprises of the
time schedules for the nodes for the dedicated channel access mechanism. Figure 3 shows the details.
The N1,N2... are the resource allocation parameters
which consists of duration and bandwidth of the allotted resources.
The Node runs the FCP process
after receiving time ’scheduling frame’ which will defer its contention for the channel and wait for its designated time frame for the channel access.
3 Analysis
In the Analysis we assume that there are a group
of nodes which send the RTS packets to the channel in poisson distribution with an aggregate mean
arrival rate of λ packets per unit time. The average size of data packet is δ. The length of RTS and
CTS packets are α and β respectively. The maxi5
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
Algorithm 3 Priority algorithm at Cluster head
Begin
if (received Packet from nodei =Resource Request
frame(pi , ri )) then
// capturing malicious behaviour
calculate the allotted resources parameter Ra
calculate the consumed resources parameter Rc
Generate resource utilisation parameter of nodei
as Ui ' f (Ra ∼ Rc )
if Ui is positive then
nodei is in greediness
Set greediness parameter ' modulus Ui ; Ui ∈
(0, 1)
else
if Ui is negetive then
nodei is misappropriating the resources
Set miappropriation parameter ' modulus
Ui ; Ui ∈ (0, 1)
else
nodei is non malicious
Ui = 1
end if
end if
end if
and propagation delay back to the sender, and the
data packet followed by a propagation delay. Accordingly, the time for a successful transmission, T,
is
T = α + β + 3τ + δ
where α is the RTS duration, β is the CTS duration
and τ is the maximum packet transmission delay
and δ is the packet size.
Unsuccessful
transmission: Because FAMA
guarantees that data packets sent after a successful
RTS will not collide with any other packet, an
unsuccessful transmission consists of one RTS being
sent to the channel at time t0 , followed by one or
more RTSs transmitted by other stations with in a
period of X Seconds, (t0 ≤ X ≤ τ ) plus one propagation delay. Therefore the average unsuccessful
transmission is given by
Tunsuccessfully = (α + τ + X)
where X is the first moment of the random variable
X. The cumulative distribution of the X is given by
FY (y) = eλ(τ −y) where (y ≤ λ) therefore
P
X = yeλ(τ −y) where (y ≤ λ)
X = τ − (1 − e(−τ λ) )/λ
mum propagation delay from any node to the CH is
τ seconds. We assume that packets can collide with
each other and hence there is packet retransmission
probability greater than zero. Without loss of generality, we ignore the effect of frame errors due to bit
errors introduced by channel noise. Therefore frames
are received in error only when they encounter collisions due to other simultaneous transmissions. A
successful transmission consists of an RTS with one
propagation delay to the intended recipient, a CTS
SUCCESSFUL TRANSMISSION TIME
UNSUCCESSFUL
TRANSMISSION
Probability of success: The transmission gets successfull when a node send an RTS and with in the
vulnerability period τ there is no other RTS from
other node because all nodes have sensed the RTS
transmission. Therefore the success probability is
that there is no RTS arrivals with in τ seconds. The
probability of RTS arrivals in τ seconds is given by
PRT S arrival in τ seconds = Pa = 1 − e−λτ . Now
the transmission become successfull when there are
no such arrival. Hence
DEDICATED CHANNEL DURATION
Ps = P(no
2t
RTS
Idle
Period
DATA
RTS
t
STATION A
DATA
CTS
CTS
CTS
Idle
Period
RTS
t
RTS
DATA
t
TSF
t
t
seconds)
= 1 − Pa = e−λτ
The success full transmission will occur for a period
of T with probability Ps . An unsuccessful transmission occurs for a period of Tunsuccessf ul .
Dedicated time allocation: The CH will gain
control over the channel using FAMA contention and
sends a time schedule frame of length γ seconds. The
STATION B
CHANNEL
2t
2t
t : Max Propagation delay
TSF : Tine scheduling frame
RTS
DATA
arrivals in τ
VELNE
RABILITY
PERIOD Y
Figure 4: FAMA-FCP-Transmission periods
6
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
best effort service traffic class nodes will how ever
follow the normal FAMA channel contention mechanism and during the dedicated channel allocation
these nodes will defer their transmissions till the next
frame arrival.
The Figure 6 shows the channel utilization
achieved by the eight nodes. It is clearly seen that
the priority nodes will attain better utilization and
hence throughput depending on the priority, where as
the best effort traffic class nodes will attain an equal
and lower service priority. Thus FCP over FAMA
improves the throughput performance of the nodes.
The Figure 7 shows the effect of the number of nodes
in the cluster. Increase in the number of nodes will
increase the collision and hence it effects on the utilization. The Figure 8 shows the effect of packet arrival rate λ over the channel utilization. Under lower
rates, the channel is under utilized where as under
higher rate the channel utilization drops due to the
collision. Figure 9 shows the average jitter experience by a FCP-FAMA node as well as FAMA node,
it indicates an improved average jitter performance
in the FCP-FAMA case. The Figure.10 gives the
nodes verses the average jitter for the FCP-FAMA
and FAMA.
frame transmission success probability depends on
the Ps again. When a frame is successfully received
then the channel is dedicated to an individual node
for a period of the priority times the data packet size.
Priority: Let pi (i : 1 ≤ i ≤ k) be the set of
priorities (pi ≥ 1) over which the nodes attain the
priority transmission. Hence the channel is dedicated
for the period of pi δ for each node.
Busy time: Hence a average busy time B is given
by sum of successfull transmission period, unsuccessful transmission period and dedicated time.
B = e−τ λ (β + δ + 2τ ) + α + 2τ −
P
e−τ λ (γ + i pi δ)
(1 − e−τ λ )
+
λ
Idle period: The FAMA imposes a fixed waiting
periods of 2τ before each transmission period of
the channel before making the transition to the
PASSIVE or BACKOFF states [1]. Therefore the
average waiting period is I
I=
1
+ 2τ
λ
Useful period: In the busy period B the amount of
the time each node has utilized the channel is given
by U
Table 1: Variables assigned in simulation
S.No
1
2
3
4
5
6
7
8
9
U = δe−τ λ + pi δe−τ λ
for an ith priority node. Thus the channel utilization
for the ith priority node is given by
S=
4
U
(B + I)
Simulation
This section describes the simulation of the above
proposed QoS aware MAC protocol under the node
configuration scenario given in Figure 5. We considered eight nodes in a cluster with a base-node as a
CH. Among the eight nodes A to H, A,B,C,D, nodes
has set of QoS requirements, where as the other nodes
have the best effort service traffic. The CH collects
the requests from the QoS nodes and run the priority
algorithm to set the priority among those nodes. The
Variable
TP rop τ
TP roc
Ttr
α
β
δ
TF AM A
γ
Rate
Value
0.000001sec
0.000002sec
0.0001 sec
80 bytes duration
240 bytes duration
1024 bytes
2 × Tprop + Ttr + Tproc
480 bytes duration
1MBps
5 Conclusions
We have shown an adaptive MAC protocol which has
a democratic approach for the service differentiation
in different traffic class. We have simulated the protocol ( FCP over FAMA). It showed that the nodes
attains priority while accessing the channel with pri7
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
0.95
No.of FAMA nodes verses Channel utilisation
No.of FCP-FAMA nodes verses channel Utilisation
0.9
Channel utilisation
0.85
0.8
0.75
0.7
0.65
0.6
1
Figure 5: A cluster with 8 priority nodes
2
3
4
5
6
7
8
nodes(sec)
Figure 7: Channel utilization verses active number of nodes
1
Priority 1
priority 2
priority 3
priority 4
no priority
no priority
no priority
no priority
0.9
Channel Utilization
0.45
’f9’ u 1:2
’f9’ u 1:3
’f9’ u 1:4
’f9’ u 1:4
’f9’ u 1:5
’f9’ u 1:6
’f9’ u 1:7
’f9’ u 1:8
’f9’ u 1:9
0.4
0.35
0.7
Throughput
0.3
0.6
0.25
0.2
0.15
0.1
0.5
0.05
0
0.01
0.4
0
1000
2000
3000
4000
5000
6000
7000
8000
0.1
1
Offered load
9000
10
100
time
Figure 6:
FAMA
Figure 8: Throughput of the nodes with offered load
Performance comparision of FCP-FAMA and
ority packet. The nodes loose their priority if they
behave maliciously. The energy level requirements
were taken into consideration. The FCP takes into
consideration the democratic allocation of the channel among the nodes. The improved performance in
jitter and throughput is achieved using the FCP protocol.
40
Average jitter for a FCP-FAMA node
Average jitter for a FAMA node
35
30
average jitter(sec)
Utilisation
0.8
25
20
15
10
References
5
[1] Chane Lee Fullmer . Collision Avoidance Techniques
for Packet Radio Networks PhD Thesis submitted in
Computer Engineering ,University of California Santa
Cruz.June 1998.
0
0
2000
4000
6000
8000
10000
time(sec)
12000
14000
16000
18000
Figure 9: Average jitter experienced by the nodes
8
Proceedings of the 6th WSEAS International Conference on Applied Informatics and Communications, Elounda, Greece, August 18-20, 2006 (pp65-73)
[9] Yunli Chen, Qing-An Zeng and Dharma P. Agrawal,
”Performance evaluation for IEEE 802.11e enhanced
distributed coordination function”, Wireless Communications and Mobile Computing, Vol. 4, pp. 639653,
2004.
7
No.of FCP-FAMA nodes verses average jitter(sec)
No.of FAMA nodes verses average jitter(sec)
6
avg_jitter(sec)
5
4
[10] Tianbo Kuang, Carey Williamson, ”A bidirectional
multi-channel MAC protocol for improving TCP
performance on multihop wireless ad hoc networks”,
Proceedings of the 7th ACM international symposium
on Modeling, analysis and simulation of wireless and
mobile systems, pp. 301 - 310, 2004.
3
2
1
1
2
3
4
nodes(sec)
Figure 10: Average jitter verses active number of nodes
[11] Zygmunt J. Haas, Jing Deng, ”Dual busy tone
multiple access (DBTMA)-a multiple access control
scheme for ad hoc networks”, IEEE Transactions on
Communications, Vol. 50, No. 6, pp. 975 - 985, June
2002.
[2] RFC 4376 / RFC4376 Requirements for Floor Control Protocol. http://www.rfc-editor.org/rfc/rfc4376.txt
[3] Tiantong You and Hossam Hassanein, ”Infrastructurebased MAC in wireless mobile ad-hoc networks”, 27th [12] Phil Karn, ”MACA - A new channel access method
Annual IEEE Conference on Local Computer Netfor packet radio”, ARRL/CRRL Amateur Radio 9th
works, pp. 821 - 830, November 2002.
computer Networking Conference, pp. 134 - 140, 1990.
[4] A. Artikis, L. Kamara, J. Pitt, and M. Sergot. A
[13] Vaduvur Bharghavan, Alan Demers, Scott Shenker,
protocol for resource sharing in norm-governed ad hoc
Lixia Zhang, ”MACAW: a media access protocol for
networks. In Proceedings of the Declarative Agent Lanwireless LAN’s”, Proceedings of the conference on
guages and Technologies (DALT) Workshop. Springer
Communications architectures, protocols and applicaVerlag, 2004.
tions, pp. 210 - 225, 1994.
[5] Luciano Bononi, Luca Budriesi, Danilo Blasi, Vin[14] Kaixin Xu, Mario Ger1a, and Sang Bae, ”How
cenzo Cacace, Luca Casone, Salvatore Rotolo, ”A
effective is the IEEE 802.11 RTS/CTS handshake in
differentiated distributed coordination function MAC
ad hoc networks”, IEEE Global Telecommunications
protocol for cluster-based wireless ad hoc networks”,
Conference, Vol. 1, pp. 72 - 76, 2002.
Proceedings of the 1st ACM international workshop on
performance evaluation of wireless ad hoc, sensor, and
ubiquitous networks, pp. 77 - 86, 2004.
[15] Huei-Jiun Ju, Izhak Rubin, and Yen-Cheng Kuan,
”An adaptive RTS/CTS control mechanism for IEEE
802.11 MAC protocol”, IEEE Vehicular Technology
[6] G Bianchi, IEEE 802.11 Saturation Throughput
Conference, Vol. 2, pp. 1469 - 1473, 2003.
Analysis ,IEEE Communications Letter Vol 2 No 12
Dec 1998.
[16] Chunhung Richard Lin and Mario Gerla, ”Adaptive
clustering for mobile wireless networks”, IEEE Journal
on Selected Areas in Communications, Vol. 15, No. 7,
pp. 1265 - 1275, September 1997.
[7] Sheldon M Ross, Simulation 3 edition Academic Press
2002.
[8] Chunhung Richard Lin and Mario Gerla, ”Adaptive
clustering for mobile wireless networks”, IEEE Journal
on Selected Areas in Communications, Vol. 15, No. 7,
pp. 1265 - 1275, September 1997.
9
Download