A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(<Special Section>Networking Technologies for Mobile Internet Systems)
スポンサーリンク
概要
- 論文の詳細を見る
Since IEEE 802.11 has many problems such as hidden node, exposed node problem, larger sensing function and BEB (Binary Exponential Back-off), it is not suitable for use in multi-hop wireless ad hoc network. When an on-demand routing protocol is used with 802.11 DCF (Distributed Coordination Function), the route to transmit the packet will be formed by nodes which have less competition (fewer neighbors) than others for the medium access. This effect will make that the routing path will be longer and decrease network performance. Therefore, we propose a new MAC (Medium Access Control) protocol that makes a shorter routing path, enabling better performance in multi-hop wireless ad hoc networks. The protocol modifying IEEE 802.11 DCF gives priority to the node with more neighbors and with less transmission. Through simulations, we have demonstrated that the proposed algorithm improves performance in terms of transmission rate, transmission delay and total consumption energy.
- 社団法人電子情報通信学会の論文
- 2004-09-01
著者
-
Lee Sunghak
Korea Advanced Institute Of Science And Technology
-
Yoon Hyunsoo
Korea Advanced Inst. Of Sci. And Technol. (kaist) Kor
-
Yoon Hyunsoo
Korea Advanced Institute Of Science And Technology
-
JOO Jaikwan
Korea Advanced Institute of Science and Technology
関連論文
- VAMSD : Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems(Mobile Communication, Wireless Technologies and Computational Electromagnetics)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
- A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(Networking Technologies for Mobile Internet Systems)