Ijcot v3i11p110

Page 1

International Journal of Computer & Organization Trends –Volume 3 Issue 11 – Dec 2013

An Effienct Collision Free MAC Scheme for Wireless LANS with Constant Contention Time P.NagaSrikanthKumar 1 , Mrs. Y.V.N.Tulasi 2 1 2

PG Student in cse department,Gudlavalleru Engineering College,Gudlavalleru,Krishna(dt) Assistant professor in cse department,Gudlavalleru Engineering College,Gudlavalleru,Krishna(dt)

Abstract – IEEE 802.11 specifies a set of protocols for a wireless LAN defined by IEEE which covers the physical and data link layer. Nowadays, IEEE 802.11 based WLAN has a widespread and providing wireless connectivity to several electronic devices like cell phones, laptops, gaming devices and so on. All these devices operate on the same medium and contend with each other in order to access the medium. All devices using the IEEE 802.11 Standard adopt a basic MAC scheme called the distributed coordination function (DCF) whose key function is contention resolution. In a slot, the stations probabilistically send a jam signal on the channel. The stations listening retire if they hear a jam signal. The others continue to the next slot. Over several slots, we aim to have one station remaining in the contention, which will then transmit its data. The DCF utilizes a Binary Exponential Back-off (BEB) scheme to reduce the collision probability by doubling the contention window (cw ) upon a packet collision. In this paper, we propose a new back-off algorithm to enhance the performance of DCF in IEEE 802.11 MANETs, which is based on the idea of using a threshold of the collision rate to switch between two different increasing functions . The performance results reveal that the improved DCF is able to achieve higher throughput as well as lower packet loss probability than the original DCF. Research will shows that DCF’s performance degrades especially with the large number of stations. Our scheme, which attempts to resolve the contention in a constant number of slots (or constant time).

Keywords – protocols.

Computer networks, wireless LAN, access

I. INTRODUCTION The application of wireless networks in everyday computing has long been a success story and new wireless technologies go on to emerge .Nowadays, wireless networks certainly are a necessary portion of computing world. It was brought to possibility from the IEEE 802.11 Standard that gives

ISSN: 2249-2593

technical specifications for the wireless interfaces. Besides, the Wi-Fi Alliance was formed to certify interoperability of wireless products from various vendors. The Medium Access Control (MAC) scheme inside the standard that's most widely used happens to be the Distributed Coordination Function (DCF). Its function would be to arbitrate using the medium to multiple stations that are connected to one AccessPoint(AP) within the infrastructure mode. Besides, DCF work extremely well in the infrastructure-less, or unintended, mode in which there is virtually no AP. This paper supplies a study according to the MAC schemes. We propose a fresh scheme therefore we have a comparison between our scheme, DCF and a few other efficient schemes.The contention with DCF works like the following. The stations use Contention Windows (CW) to randomize their access and take a look at to steer clear of collisions. Initially, a station waits for DIFS (DCF Inter Frame Space) and transmits in the event the channel is idle[1].With in ad hoc wireless network where mobile units engage omnidirectional antennas, each communications channel is in facts hared by closely located mobiles. The sharing with this channel is controlled from the employed Medium Get access to Control (MAC) protocol. The network’s throughput efficiency will depend on the running of the MAC protocol. Contention based random-access multiple get access to protocols have been widely used as they are really simple to implement. To further increase the efficiency of the operation, carrier sense based MAC algorithms are used, requiring the mobile terminal to first sense the channel to actually determine that in fact its's idle and simply then attempt its envelope transmission. The latter attempts is still able to ends in a collision event (as soon as the intended receiver detects a number of transmissions at such power levels that it also you won't be able to correctly receive any one them). Frequently used this sort of protocols include Carrier Sensing Multiple Access (CSMA) and CSMA with Collision Avoidance (CSMA/CA). However, if the channel is busy, the CW is designed. The CW is initially assigned to a preset value, CWmin, which depends toward the physical layer. Then, a station sets a backoff (BO) in contact with a random value chosen from a uniform distribution from (0; CW). The station decreases the BO counter by one for any time slot the channel is idle. Any time

http://www.ijcotjournal.org

Page 543


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.