SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
    ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098

         Performance Evaluation of MAC Protocols in VANETs
                                              Manveer Kaur*
                         *(Department of Computer Science, Punjabi University, Patiala)


Abstract
Vehicular Adhoc Network (VANET) is an                      protocols, building better simulations, bit bate &
example of Mobile Adhoc Network (MANET)                    power consumption. We are considering MAC
that uses moving cars as nodes in a network to             protocols in this paper.
create a mobile network. They are popular for                  The safety applications of VANETs require
life safety applications and internet access               better Quality of Service (QoS) in terms of delay
applications. There is a no. of issues which are to        and throughput. To provide better QoS, the
be resolved for the VANETs and Media Access                protocols have been compared and analyzed so that
Protocols (MAC) is one of them. In this paper we           the results will help to design the new VANETs and
will discuss about the performance of 802.11               modified MAC protocols for them. The IEEE
based MAC protocols i.e. PCF and EDCF. We                  802.11 based MAC protocols have been considered
analyzed the performance of PCF and EDCF                   because of their popularity and ease of
protocols in terms of delay and throughput for             implementation. The two protocols are based on
different types of traffic which are voice, video,         CSMA/CA contention free method and do not
HTTP and remote login. The two protocols show              require synchronization between the vehicles.
different delay and throughput for each type of               The paper is organized as follows: section II
service during simulation. The simulator OPNET             describes the MAC Protocols in detail. Section III
modeler 14.5 has been used to simulate the                 analyses the performance of two protocols in terms
protocols over same scenario. The simulation               of delay and throughput for various types of
results shown that the EDCF protocol performs              services. Finally, section IV concludes the paper.
better than PCF in VANETs.
                                                           2. MAC Protocols
Keywords:         VANET, MAC, PCF, EDCF,                   Media Access Control protocols such as TDMA,
OPNET.                                                     FDMA, or CDMA are difficult to implement for
                                                           VANET. For any of these protocols to be used
1. INTODUCTION                                             either time-slots, channels, or codes need to be
Vehicular networks consist of large no. of vehicles        dynamically       allocated,     which      requires
which are autonomous and self organizing and               synchronization that is difficult to achieve in a
involve themselves as servers and/or clients for           network where the nodes have a high degree of
exchanging          and        sharing     information.    mobility.
Communication in VANETs may be of two types:                   The objective of the media access control
Vehicle-to-Vehicle (V2V) versus Vehicle-to/from-           protocol is to arbitrate the access to the shared
Infrastructure (V2I) These vehicles will require an        medium, which in this case is the wireless channel.
authority to govern them, each vehicle can                 If no method is used to coordinate the transmission
communicate with other vehicles using short radio          of data, then a large number of collisions would
signals      DSRC        (Directed      Short    Range     occur and the data that is transmitted would be lost.
Communication- 5.9 GHz), for range can reach               The ideal scenario is a MAC that prevents nodes
1Km, this communication is an Ad hoc                       within transmission range of each other from
communication that means each connected node can           transmitting at the same time, thus preventing
move freely, no wires required, the routers used are       collisions from occurring. Equally important, the
called Road Side Unit (RSU). The RSU works as a            media access control must be fair, efficient, and
router b/w the vehicles on the road and connected to       reliable. [3] Moreover high reliability and low
other n/w devices and it is also known as                  latency are the major requirements of the VANETs.
infostation. [2] Each vehicle has OBU (On Board            So MAC protocols should be able to fulfill these
Unit), this unit connects the vehicle with RSU via         requirements. [4]
DSRC radios, and another vehicle is TPD (Tamper
Proof Device), this device holding the vehicles              The major problems that a MAC protocol for
secrets, all information about the vehicles like keys,     VANETs has to solve are to:
driver identity, trip details, speed etc.                           I.    Transmission Collisions
                                                                   II.    The Hidden Terminal Problem
    VANET is a new technology and there are a no.                 III.    Exposed Node Problem
of issues which are to be resolved for it, these issues
includes data segmentation & re-assembling, MAC


                                                                                                  93 | P a g e
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
    ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098
The methods Request to Send (RTS) and Clear to             stations contending for the channel access in a
Send (CTS) are used to solve these problems.               distributed manner. However, equal access
                                                           probabilities are not desirable among stations with
2.1 Point Coordination Function (PCF)                      different priority frames.
The point coordination function is a centralized,
polling-based access mechanism which requires the              With the EDCF, a station cannot transmit a frame
presence of an Access Point (AP) that acts as Point        that extends beyond a time interval called EDCF
Coordinator (PC) to provide contention-free frame          transmission opportunity (TXOP) limit. If a frame is
transfer for processing time-critical information          too long to be transmitted in a single TXOP, it
transfers. PCF uses the point coordinator (PC) as the      should be fragmented into multiple frames. We also
polling master. [6] At the beginning of the                introduce and evaluate a mechanism called the
contention-free period (CFP), the point coordinator        contention-free burst (CFB) that allows a station to
has an opportunity to gain control of the medium In        transmit multiple MAC frames consecutively as
the PCF mode, time is divided into superframes.            long as the whole transmission time does not exceed
Each superframe consists of a contention period            the EDCF TXOP limit, which is determined and
where DCF is used and a contention-free period             announced by the access point (AP). [7] The
(CFP) where PCF is used. The CFP is started by a           emerging EDCF is designed to provide
beacon frame sent by the PC using DCF.                     differentiated, distributed channel accesses for
                                                           frames with 8 different priorities (from 0 to 7). Each
                                                           QoS data frame carries its priority value in the MAC
                                                           frame header. An 802.11e STA shall implement four
                                                           access categories (ACs), where an AC is an
                                                           enhanced variant of the DCF 0. Each frame arriving
                                                           at the MAC with a priority is mapped into an AC as
                                                           shown in Table I. Note the relative priority of 0 is
                                                           placed between 2 and 3. This relative prioritization
                                                           is rooted from IEEE 802.1d bridge specification.
             Fig.1. Structure of Superframe
                                                               Table I Priority to Access Category Mappings
    The CFP may vary from superframe to
superframe, as the base station has to contend for
the medium. Once the CFP starts, the PC polls each
station in its polling list (the high priority stations)
when they can access the medium. To ensure that no
DCF stations are able to interrupt this mode of
operation, the inter frame space between PCF data
frames (PIFS) is shorter than the DIFS. To prevent
starvation of stations that are not allowed to send
during the CFP, there must always be room for at
least one maximum length frame to be sent during
the contention period. [5]
    The PC polls the stations in a round-robin
fashion. A polled station always responds to a poll.
If there is no pending transmission, the response is a
null frame containing no payload. If the CFP                  Basically,    an     AC     uses     AIFSD[AC],
terminates before all stations have been polled, the       CWmin[AC], and CWmax[AC] instead of DIFS,
polling list is resumed at the next station in the         CWmin, and CWmax, of the DCF, respectively, for
following CFP cycle. A typical medium access               the contention process to transmit a frame belonging
sequence during PCF is shown in Fig. 1. A station          to access category AC. AIFSD[AC] is determined
being polled is allowed to transmit a data frame. In       by
case of an unsuccessful transmission, the station                 AIFSD [AC] =SIFS+AIFS [AC] *SlotTime ,
retransmits the frame after being repolled or during       where AIFS[AC] is an integer greater than zero.
the next Contention Period.                                Moreover, the backoff counter is selected from [1,
                                                           1+CW [AC]], instead of [0, CW] as in the DC .Fig.
2.2Enhanced Distributed Co-ordination Function             2 shows the timing diagram of the EDCF channel
(EDCF):                                                    access.
The 802.11 legacy MAC does not support the                    The values of AIFS[AC], CWmin[AC], and
concept of differentiating frames with different           CWmax[AC], which are referred to as the EDCF
priorities. Basically, the DCF is supposed to provide      parameters, are announced by the AP via beacon
a channel access with equal probabilities to all           frames. The AP can adapt these parameters
                                                           dynamically depending on network conditions.


                                                                                                   94 | P a g e
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
   ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098
Basically, the smaller AIFS[AC] and CWmin[AC],        CFB increases the system throughput without
the shorter the channel access delay for the          degrading other system performance measures
corresponding priority, and hence the more capacity   unacceptably as long as the EDCF TXOP limit
share for a given traffic condition.                  value is properly determined.




                                                                  Fig.4. CFB timing structure
      Fig.2.IEEE 802.11e EDCF Channel Access

   Fig. 3 shows the 802.11e MAC with four
transmission queues, where each queue behaves as a    3. Simulation Evaluation
single enhanced DCF contending entity. When there     There exists a no. of simulators which can be used
is more than one AC finishing the backoff at the      for network simulation. The popular simulators are:
same time, the collision is handled in a virtual      NS2, OPNET, OMNET, MATLAB etc. This
manner. That is, the highest frame among the          research is conducted using discrete event
colliding frames is chosen and transmitted, and the   simulation software known as OPNET Modeler 14.5
others perform a backoff priority with increased CW   OPNET is Optimized Network Engineering Tool. In
values.                                               this simulator, number of parameters is available to
   The IEEE 802.11e defines a transmission            study the performance of network. Various
opportunity (TXOP) as the interval of time when a     parameters like end to end delay, throughput,
particular STA has the right to initiate              retransmission attempts and data dropped etc. These
transmissions. Along with the EDCF parameters of      parameters are known as performance metrics.
AIFS[AC], CWmin[AC], and CWmax[AP], the AP
also determines and announces the limit of an EDCF       We have modeled a no. of scenarios in which the
TXOP interval for each AC, i.e., TXOPLimit[AC],       wireless stations have been configured with PCF
in beacon frames. During an EDCF TXOP, a STA is       and EDCF functionalities separately. Moreover,
allowed to transmit multiple MPDUs from the same      these scenarios are also distinguished in case of type
AC with a SIFS time gap between between an ACK        of service that runs in the scenario i.e. voice, video,
and the subsequent frame transmission. We refer       HTTP and remote login. To compare the
this multiple MPDU transmission to as “Contention-    performance of two protocols, these protocols have
Free Burst (CFB).”                                    been implemented in the network model having AP
                                                      which is connected to the backbone and it acts like
                                                      an RSU and it represents the V2I communication of
                                                      VANETs. To evaluate the performance of EDCF
                                                      protocol for different types of services, it is
                                                      implemented in pure adhoc network which
                                                      represents the V2V communication in VANETs.

                                                          The EDCF protocol classify all the traffic types
                                                      into four classes which corresponds to AC (0),
                                                      AC(1), AC(2) and AC(3) respectively and for each
                                                      of these classes different applications have been
                                                      configured in the application profile of the EDCF
                                                      configured scenarios. Table II describes it in detail.

                                                          Each simulation scenario consisted of 50 nodes
  Fig.3. Four access categories (ACs) for EDCF        which were arranged randomly. The routing
                                                      protocol AODV has been enabled in each scenario
   Fig.4 shows the transmission of two QoS data       which is reactive in nature. All simulations are run
frames during an EDCF TXOP, where the whole           for 200 seconds.
transmission time for two data and ACK frames less
than the EDCF TXOP limit is announced by the AP.
As multiple MSDU transmission honors the TXOP
limit, the worst-case delay performance is not be
affected by allowing the CFB. We show below that


                                                                                               95 | P a g e
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
   ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098




        Table II Access Categories by EDCF
Access       Application           Designation
Category     Configured
AC(0)        HTTP(Heavy)           Background
AC(1)        Remote                Excellent Effort
             Login(Light)
AC(2)        Video                 Interactive
             Conferencing          Multimedia
AC(3)        VoIP                  Interactive Voice

3.1Comparison of PCF and EDCF
The two protocols have been compared in terms of           Fig.6.Throughputs of PCF & EDCF for Voice
delay and throughput for voice and HTTP types of
services because these are the most important types     3.1.3 Delay for HTTP
in VANETs applications.                                 In Fig.7, for a particular time period, the delay of
                                                        both protocols is constant and near about zero. After
3.1.1Delay for Voice                                    that, the delay increases gradually for both protocols
                                                        but delay for PCF is much more than that of EDCF.
Fig.5 shows the delay offered by two protocols
which is constant and zero in case of PCF protocol
throughout the simulation. And for EDCF, it is
constant and zero for a time period but after that it
increases gradually. It means that delay offered by
EDCF is much more as compared to PCF. Hence
PCF must be preferred over EDCF for a greater no.
of nodes in infrastructure based VANETs.




                                                             Fig.7.Delays by PCF and EDCF for HTTP

                                                        3.1.4 Throughput for HTTP
                                                        Initially, the throughput for EDCF is slightly greater
                                                        than PCF and does not change very much. But after
                                                        some period of time, throughput for both protocols
                                                        increase sharply and they overlaps. After that,
                                                        throughput increases gradually for both protocols
                                                        but EDCF offers slightly greater than that of PCF.




  Fig.5.Delays by PCF and EDCF for Voice



 3.1.2 Throughput for Voice
         The Fig. 6 shows that for EDCF,
throughput of EDCF is much better than PCF. As
PCF shows maximum value of 3000 bits/sec,
decreases after that and then comes to zero. On the
other hand, EDCF gives maximum throughput of               Fig.8.Throughputs of PCF and EDCF for HTTP
9000 bits/sec.


                                                                                                96 | P a g e
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
   ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098

3.2 Performance of EDCF Protocol for Different          3.2.3 Data Dropped by EDCF
Types of Services                                       The Fig.11 represents the data dropped is zero and
The various services which have been taken are          constant for HTTP and Remote login. For voice and
voice, video, HTTP and remote login. The                video, the data dropped during transmission
performance has been evaluated in terms of delay,       increases during simulation. For voice and video it
throughput, data dropped and retransmission             increases sharply followed by gradual increases and
attempts. The results are as follows:                   after that becomes almost constant. Data dropped
                                                        for video is maximum among all.
3.2.1 Delay of EDCF
In Fig.9, there is no delay for the services HTTP and
Remote login throughout the simulation. For video,
the delay increases gradually and at a low rate. And
for voice applications, the delay is maximum among
all applications till the end of the simulation.




                                                                 Fig.11 Data Dropped by EDCF

                                                        3.2.4 Retransmission attempts by EDCF


              Fig.9. Delay of EDCF

3.2.2 Throughput of EDCF




                                                           Fig.12 Retransmission attempts by EDCF

                                                        In Fig.12, for HTTP, the retransmission attempts
                                                        increase gradually and for remote login they show
                                                        sharp increase and become almost constant. But for
       Fig.10. Throughput of EDCF                       real time applications, these attempts are more and
                                                        they show sharp increase. But after that, these
The Fig.10 shows the throughput for all traffic types   attempts start decreasing for voice and become
which is maximum for video applications which is        almost constant for video. It concludes that
4,000,000 bits/sec and even after this value it         retransmission attempts are maximum for video
continues to increase. The throughput for all           applications.
applications is zero and constant initially which
causes overlapping of lines and then increases          4. CONCLISION
gradually for all. As compared to other applications,   The results obtained from the simulations show that
throughput of EDCF for Remote login is least. The       EDCF performs better than PCF for different types
throughput for HTTP greater than that of video but      of services. It provides less delay and more
after some time reverse is there.                       throughputs for delay sensitive applications such as
                                                        voice and non-real time services such as HTTP. It is



                                                                                              97 | P a g e
Manveer Kaur / International Journal of Engineering Research and Applications (IJERA)
   ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098
because EDCF provides efficient service                 [10]   Barlomeij      Blaszczyszyn     &       Paul
differentiation which is not provided by PCF and               Muhlethaler, Performance of MAC
hence can be efficiently adapted in VANETs. Due to             Protocols in Linear VANETs under
service differentiation, the lower priority traffic            different Attenuation & Fading conditions,
types may be starved and never get transmitted. PCF            12th International IEEE Conf. on Intelligent
may be adapted for delay insensitive applications as           Transportation Systems, St. Louis, USA,
it shows better overall capacity and consider all              2009, 715-720.
traffic types equivalently. We have not considered      [11]   Cuyu, C., Xiang Yong, Meilin, S., Lin
the network conditions like fading and attenuation in          Liang, Performance Observations on MAC
the research work which can be the extension of this           Protocols of VANETs in Intelligent
research.                                                      Transportation System, WRI International
                                                               Conference on Communications and
               REFERENCES                                      Mobile Computing, Yunnan, 2009, 373 –
  [1]    Jochen Schiller, Mobile Communication                 379.
         (Institute    of     Informatics,     Freuie   [12]   Sandeep Kaur, Dr. Jyotsna Sengupta,
         Universitat, Berlin, 2004).                           Performance Evaluation of IEEE 802.11e,
  [2]    Gayathri Chandrasekaran, VANETs: The                  International Journal on Computer Science
         Networking Platform for Future Vehicular              and Technology, 2(4), 2011,40-44.
         Applications, Department of Computer
         Science, Rutgers University, 2008.             [13]   Jong-Moon Chung, Minseok Kim, Yong-
  [3]    H. Agustin Cozzetti, Riccardo M.                      Suk Park, Myungjun Choi, Sangwoo Lee
         Scopigno,Luca Casone, Giuseppe Barba,                 and Hyun Seo Oh, Time Coordinated V2I
         Mapcast: A Map-Constrained Broadcast                  Communications and Handover for WAVE
         Solution for VANETs, 6th IEEE                         Networks , IEEE Journal On Selected
         International Conf. on Wireless and Mobile            Areas In Communications, 29(3), 2011,
         Computing,           Networking          and          545-558.
         Communications, Niagara Falls, Canada,
         2010, 172-179.
  [4]    Alexandru Oprea, A Survey and
         Qualitative Analysis of MAC Protocols for
         Vehicular Ad Hoc Networks, IEEE
         Wireless Communications, October 2006,
         pp.30-35.
  [5]    Moustafa A. Youssef, Arunchandar Vasan,
         Raymond E. Miller, Specification and
         Analysis of the DCF and PCF Protocols in
         the 802.11 Standard Using Systems of
         Communicating Machines, Proc. 10th
         IEEE Conf. on Network Protocols, 2002,
         132 – 141.
  [6]    Praveen Durbha and Matthew Sherman,
         Quality of Service (QoS) in IEEE 802.11
         Wireless Local Area Networks: Evaluation
         of Distributed Coordination Function
         (DCF) and Point Coordination Function
         (PCF).
  [7]    Sunghyun Choi, Javier del Prado, Sai
         Shankar N, Stefan Mangold, IEEE 802.11e
         Contention-Based Channel Access(EDCF)
         Performance                 Evaluation,IEEE
         International Conf. on Communications,
         Anchorage, AK, 2003, 1151 - 1156.
  [8]    IEEE 802.1d-1998, Part 3: Media Access
         Control (MAC) bridges, ANSI/IEEE Std.
         802.1D, 1998 edition, 1998
  [9]    Yue Liu, Jun Bi, Ju Yang, Research on
         Vehicular Ad Hoc Networks, Chinese
         Control and Decision Conference, Guilin,
         2009, 4430 – 4435.




                                                                                             98 | P a g e

Mais conteúdo relacionado

Mais procurados

It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2Debasis Das
 
Uplink control channel design for 3 gpp lte
Uplink control channel design for 3 gpp lteUplink control channel design for 3 gpp lte
Uplink control channel design for 3 gpp ltemerriam2008
 
01 paper uvi m (edit a)
01 paper uvi m (edit a)01 paper uvi m (edit a)
01 paper uvi m (edit a)IAESIJEECS
 
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Eiko Seidel
 
Fec energy savings
Fec energy savingsFec energy savings
Fec energy savingstornado1234
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Engineer new post -hangzhou wumu technology co.,ltd.The Design of Human-Mach...
Engineer new post  -hangzhou wumu technology co.,ltd.The Design of Human-Mach...Engineer new post  -hangzhou wumu technology co.,ltd.The Design of Human-Mach...
Engineer new post -hangzhou wumu technology co.,ltd.The Design of Human-Mach...Stephanie hu
 
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationIOSR Journals
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Eiko Seidel
 

Mais procurados (20)

It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2It 802 d_Mobile Communications_part 2
It 802 d_Mobile Communications_part 2
 
456 460
456 460456 460
456 460
 
Uplink control channel design for 3 gpp lte
Uplink control channel design for 3 gpp lteUplink control channel design for 3 gpp lte
Uplink control channel design for 3 gpp lte
 
01 paper uvi m (edit a)
01 paper uvi m (edit a)01 paper uvi m (edit a)
01 paper uvi m (edit a)
 
[16] Nu P 09 1
[16] Nu P 09 1[16] Nu P 09 1
[16] Nu P 09 1
 
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
Relay Enhanced LTE-Advanced Networks – Resource Allocation and QoS provisioni...
 
Mv3621812185
Mv3621812185Mv3621812185
Mv3621812185
 
MOBILE COMPUTING
MOBILE COMPUTINGMOBILE COMPUTING
MOBILE COMPUTING
 
Fec energy savings
Fec energy savingsFec energy savings
Fec energy savings
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Technical seminar
Technical seminarTechnical seminar
Technical seminar
 
Atm
AtmAtm
Atm
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Engineer new post -hangzhou wumu technology co.,ltd.The Design of Human-Mach...
Engineer new post  -hangzhou wumu technology co.,ltd.The Design of Human-Mach...Engineer new post  -hangzhou wumu technology co.,ltd.The Design of Human-Mach...
Engineer new post -hangzhou wumu technology co.,ltd.The Design of Human-Mach...
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
 
Az26337342
Az26337342Az26337342
Az26337342
 
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
Heterogeneous LTE Networks and Inter-Cell Interference Coordination - Dec 201...
 

Destaque

Destaque (20)

Ib2615731577
Ib2615731577Ib2615731577
Ib2615731577
 
U26130135
U26130135U26130135
U26130135
 
K26057066
K26057066K26057066
K26057066
 
It2616761684
It2616761684It2616761684
It2616761684
 
If2615981604
If2615981604If2615981604
If2615981604
 
X26148161
X26148161X26148161
X26148161
 
Ix2616991704
Ix2616991704Ix2616991704
Ix2616991704
 
Fw2410681072
Fw2410681072Fw2410681072
Fw2410681072
 
Boletim 01
Boletim 01Boletim 01
Boletim 01
 
Palestra arquivos e bibliotecas 2.0
Palestra arquivos e  bibliotecas 2.0Palestra arquivos e  bibliotecas 2.0
Palestra arquivos e bibliotecas 2.0
 
Informe unesco.sociedad conocimiento
Informe unesco.sociedad conocimientoInforme unesco.sociedad conocimiento
Informe unesco.sociedad conocimiento
 
البت سوسو
البت سوسوالبت سوسو
البت سوسو
 
Black world 1-2bymazharkaleem
Black world 1-2bymazharkaleemBlack world 1-2bymazharkaleem
Black world 1-2bymazharkaleem
 
Metodos UEPS
Metodos UEPSMetodos UEPS
Metodos UEPS
 
Ar 201 cocuriculum (netball)
Ar 201   cocuriculum (netball)Ar 201   cocuriculum (netball)
Ar 201 cocuriculum (netball)
 
[Segmedtrab] ergonomia ergonomia (1)
[Segmedtrab] ergonomia ergonomia (1)[Segmedtrab] ergonomia ergonomia (1)
[Segmedtrab] ergonomia ergonomia (1)
 
De Egipto A Grecia
De Egipto A GreciaDe Egipto A Grecia
De Egipto A Grecia
 
Geoprocessamento 3
Geoprocessamento 3Geoprocessamento 3
Geoprocessamento 3
 
Comportamientolizeth14
Comportamientolizeth14Comportamientolizeth14
Comportamientolizeth14
 
Marketing
MarketingMarketing
Marketing
 

Semelhante a P26093098

Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...Wendy Hager
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...IJCNCJournal
 
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...IJCNCJournal
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 

Semelhante a P26093098 (20)

Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
 
Ijnsa050212
Ijnsa050212Ijnsa050212
Ijnsa050212
 
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
A New MultiChannel MAC Protocol With On-Demand Channel Assignment For Multi-H...
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...
F-802.11P: A Fuzzy Enhancement for IEEE 802.11P in Vehicle-to-Everything Comm...
 
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMM...
 
Can Protocol For Automobiles
Can Protocol For AutomobilesCan Protocol For Automobiles
Can Protocol For Automobiles
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 
Qos wlan
Qos wlanQos wlan
Qos wlan
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

P26093098

  • 1. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 Performance Evaluation of MAC Protocols in VANETs Manveer Kaur* *(Department of Computer Science, Punjabi University, Patiala) Abstract Vehicular Adhoc Network (VANET) is an protocols, building better simulations, bit bate & example of Mobile Adhoc Network (MANET) power consumption. We are considering MAC that uses moving cars as nodes in a network to protocols in this paper. create a mobile network. They are popular for The safety applications of VANETs require life safety applications and internet access better Quality of Service (QoS) in terms of delay applications. There is a no. of issues which are to and throughput. To provide better QoS, the be resolved for the VANETs and Media Access protocols have been compared and analyzed so that Protocols (MAC) is one of them. In this paper we the results will help to design the new VANETs and will discuss about the performance of 802.11 modified MAC protocols for them. The IEEE based MAC protocols i.e. PCF and EDCF. We 802.11 based MAC protocols have been considered analyzed the performance of PCF and EDCF because of their popularity and ease of protocols in terms of delay and throughput for implementation. The two protocols are based on different types of traffic which are voice, video, CSMA/CA contention free method and do not HTTP and remote login. The two protocols show require synchronization between the vehicles. different delay and throughput for each type of The paper is organized as follows: section II service during simulation. The simulator OPNET describes the MAC Protocols in detail. Section III modeler 14.5 has been used to simulate the analyses the performance of two protocols in terms protocols over same scenario. The simulation of delay and throughput for various types of results shown that the EDCF protocol performs services. Finally, section IV concludes the paper. better than PCF in VANETs. 2. MAC Protocols Keywords: VANET, MAC, PCF, EDCF, Media Access Control protocols such as TDMA, OPNET. FDMA, or CDMA are difficult to implement for VANET. For any of these protocols to be used 1. INTODUCTION either time-slots, channels, or codes need to be Vehicular networks consist of large no. of vehicles dynamically allocated, which requires which are autonomous and self organizing and synchronization that is difficult to achieve in a involve themselves as servers and/or clients for network where the nodes have a high degree of exchanging and sharing information. mobility. Communication in VANETs may be of two types: The objective of the media access control Vehicle-to-Vehicle (V2V) versus Vehicle-to/from- protocol is to arbitrate the access to the shared Infrastructure (V2I) These vehicles will require an medium, which in this case is the wireless channel. authority to govern them, each vehicle can If no method is used to coordinate the transmission communicate with other vehicles using short radio of data, then a large number of collisions would signals DSRC (Directed Short Range occur and the data that is transmitted would be lost. Communication- 5.9 GHz), for range can reach The ideal scenario is a MAC that prevents nodes 1Km, this communication is an Ad hoc within transmission range of each other from communication that means each connected node can transmitting at the same time, thus preventing move freely, no wires required, the routers used are collisions from occurring. Equally important, the called Road Side Unit (RSU). The RSU works as a media access control must be fair, efficient, and router b/w the vehicles on the road and connected to reliable. [3] Moreover high reliability and low other n/w devices and it is also known as latency are the major requirements of the VANETs. infostation. [2] Each vehicle has OBU (On Board So MAC protocols should be able to fulfill these Unit), this unit connects the vehicle with RSU via requirements. [4] DSRC radios, and another vehicle is TPD (Tamper Proof Device), this device holding the vehicles The major problems that a MAC protocol for secrets, all information about the vehicles like keys, VANETs has to solve are to: driver identity, trip details, speed etc. I. Transmission Collisions II. The Hidden Terminal Problem VANET is a new technology and there are a no. III. Exposed Node Problem of issues which are to be resolved for it, these issues includes data segmentation & re-assembling, MAC 93 | P a g e
  • 2. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 The methods Request to Send (RTS) and Clear to stations contending for the channel access in a Send (CTS) are used to solve these problems. distributed manner. However, equal access probabilities are not desirable among stations with 2.1 Point Coordination Function (PCF) different priority frames. The point coordination function is a centralized, polling-based access mechanism which requires the With the EDCF, a station cannot transmit a frame presence of an Access Point (AP) that acts as Point that extends beyond a time interval called EDCF Coordinator (PC) to provide contention-free frame transmission opportunity (TXOP) limit. If a frame is transfer for processing time-critical information too long to be transmitted in a single TXOP, it transfers. PCF uses the point coordinator (PC) as the should be fragmented into multiple frames. We also polling master. [6] At the beginning of the introduce and evaluate a mechanism called the contention-free period (CFP), the point coordinator contention-free burst (CFB) that allows a station to has an opportunity to gain control of the medium In transmit multiple MAC frames consecutively as the PCF mode, time is divided into superframes. long as the whole transmission time does not exceed Each superframe consists of a contention period the EDCF TXOP limit, which is determined and where DCF is used and a contention-free period announced by the access point (AP). [7] The (CFP) where PCF is used. The CFP is started by a emerging EDCF is designed to provide beacon frame sent by the PC using DCF. differentiated, distributed channel accesses for frames with 8 different priorities (from 0 to 7). Each QoS data frame carries its priority value in the MAC frame header. An 802.11e STA shall implement four access categories (ACs), where an AC is an enhanced variant of the DCF 0. Each frame arriving at the MAC with a priority is mapped into an AC as shown in Table I. Note the relative priority of 0 is placed between 2 and 3. This relative prioritization is rooted from IEEE 802.1d bridge specification. Fig.1. Structure of Superframe Table I Priority to Access Category Mappings The CFP may vary from superframe to superframe, as the base station has to contend for the medium. Once the CFP starts, the PC polls each station in its polling list (the high priority stations) when they can access the medium. To ensure that no DCF stations are able to interrupt this mode of operation, the inter frame space between PCF data frames (PIFS) is shorter than the DIFS. To prevent starvation of stations that are not allowed to send during the CFP, there must always be room for at least one maximum length frame to be sent during the contention period. [5] The PC polls the stations in a round-robin fashion. A polled station always responds to a poll. If there is no pending transmission, the response is a null frame containing no payload. If the CFP Basically, an AC uses AIFSD[AC], terminates before all stations have been polled, the CWmin[AC], and CWmax[AC] instead of DIFS, polling list is resumed at the next station in the CWmin, and CWmax, of the DCF, respectively, for following CFP cycle. A typical medium access the contention process to transmit a frame belonging sequence during PCF is shown in Fig. 1. A station to access category AC. AIFSD[AC] is determined being polled is allowed to transmit a data frame. In by case of an unsuccessful transmission, the station AIFSD [AC] =SIFS+AIFS [AC] *SlotTime , retransmits the frame after being repolled or during where AIFS[AC] is an integer greater than zero. the next Contention Period. Moreover, the backoff counter is selected from [1, 1+CW [AC]], instead of [0, CW] as in the DC .Fig. 2.2Enhanced Distributed Co-ordination Function 2 shows the timing diagram of the EDCF channel (EDCF): access. The 802.11 legacy MAC does not support the The values of AIFS[AC], CWmin[AC], and concept of differentiating frames with different CWmax[AC], which are referred to as the EDCF priorities. Basically, the DCF is supposed to provide parameters, are announced by the AP via beacon a channel access with equal probabilities to all frames. The AP can adapt these parameters dynamically depending on network conditions. 94 | P a g e
  • 3. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 Basically, the smaller AIFS[AC] and CWmin[AC], CFB increases the system throughput without the shorter the channel access delay for the degrading other system performance measures corresponding priority, and hence the more capacity unacceptably as long as the EDCF TXOP limit share for a given traffic condition. value is properly determined. Fig.4. CFB timing structure Fig.2.IEEE 802.11e EDCF Channel Access Fig. 3 shows the 802.11e MAC with four transmission queues, where each queue behaves as a 3. Simulation Evaluation single enhanced DCF contending entity. When there There exists a no. of simulators which can be used is more than one AC finishing the backoff at the for network simulation. The popular simulators are: same time, the collision is handled in a virtual NS2, OPNET, OMNET, MATLAB etc. This manner. That is, the highest frame among the research is conducted using discrete event colliding frames is chosen and transmitted, and the simulation software known as OPNET Modeler 14.5 others perform a backoff priority with increased CW OPNET is Optimized Network Engineering Tool. In values. this simulator, number of parameters is available to The IEEE 802.11e defines a transmission study the performance of network. Various opportunity (TXOP) as the interval of time when a parameters like end to end delay, throughput, particular STA has the right to initiate retransmission attempts and data dropped etc. These transmissions. Along with the EDCF parameters of parameters are known as performance metrics. AIFS[AC], CWmin[AC], and CWmax[AP], the AP also determines and announces the limit of an EDCF We have modeled a no. of scenarios in which the TXOP interval for each AC, i.e., TXOPLimit[AC], wireless stations have been configured with PCF in beacon frames. During an EDCF TXOP, a STA is and EDCF functionalities separately. Moreover, allowed to transmit multiple MPDUs from the same these scenarios are also distinguished in case of type AC with a SIFS time gap between between an ACK of service that runs in the scenario i.e. voice, video, and the subsequent frame transmission. We refer HTTP and remote login. To compare the this multiple MPDU transmission to as “Contention- performance of two protocols, these protocols have Free Burst (CFB).” been implemented in the network model having AP which is connected to the backbone and it acts like an RSU and it represents the V2I communication of VANETs. To evaluate the performance of EDCF protocol for different types of services, it is implemented in pure adhoc network which represents the V2V communication in VANETs. The EDCF protocol classify all the traffic types into four classes which corresponds to AC (0), AC(1), AC(2) and AC(3) respectively and for each of these classes different applications have been configured in the application profile of the EDCF configured scenarios. Table II describes it in detail. Each simulation scenario consisted of 50 nodes Fig.3. Four access categories (ACs) for EDCF which were arranged randomly. The routing protocol AODV has been enabled in each scenario Fig.4 shows the transmission of two QoS data which is reactive in nature. All simulations are run frames during an EDCF TXOP, where the whole for 200 seconds. transmission time for two data and ACK frames less than the EDCF TXOP limit is announced by the AP. As multiple MSDU transmission honors the TXOP limit, the worst-case delay performance is not be affected by allowing the CFB. We show below that 95 | P a g e
  • 4. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 Table II Access Categories by EDCF Access Application Designation Category Configured AC(0) HTTP(Heavy) Background AC(1) Remote Excellent Effort Login(Light) AC(2) Video Interactive Conferencing Multimedia AC(3) VoIP Interactive Voice 3.1Comparison of PCF and EDCF The two protocols have been compared in terms of Fig.6.Throughputs of PCF & EDCF for Voice delay and throughput for voice and HTTP types of services because these are the most important types 3.1.3 Delay for HTTP in VANETs applications. In Fig.7, for a particular time period, the delay of both protocols is constant and near about zero. After 3.1.1Delay for Voice that, the delay increases gradually for both protocols but delay for PCF is much more than that of EDCF. Fig.5 shows the delay offered by two protocols which is constant and zero in case of PCF protocol throughout the simulation. And for EDCF, it is constant and zero for a time period but after that it increases gradually. It means that delay offered by EDCF is much more as compared to PCF. Hence PCF must be preferred over EDCF for a greater no. of nodes in infrastructure based VANETs. Fig.7.Delays by PCF and EDCF for HTTP 3.1.4 Throughput for HTTP Initially, the throughput for EDCF is slightly greater than PCF and does not change very much. But after some period of time, throughput for both protocols increase sharply and they overlaps. After that, throughput increases gradually for both protocols but EDCF offers slightly greater than that of PCF. Fig.5.Delays by PCF and EDCF for Voice 3.1.2 Throughput for Voice The Fig. 6 shows that for EDCF, throughput of EDCF is much better than PCF. As PCF shows maximum value of 3000 bits/sec, decreases after that and then comes to zero. On the other hand, EDCF gives maximum throughput of Fig.8.Throughputs of PCF and EDCF for HTTP 9000 bits/sec. 96 | P a g e
  • 5. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 3.2 Performance of EDCF Protocol for Different 3.2.3 Data Dropped by EDCF Types of Services The Fig.11 represents the data dropped is zero and The various services which have been taken are constant for HTTP and Remote login. For voice and voice, video, HTTP and remote login. The video, the data dropped during transmission performance has been evaluated in terms of delay, increases during simulation. For voice and video it throughput, data dropped and retransmission increases sharply followed by gradual increases and attempts. The results are as follows: after that becomes almost constant. Data dropped for video is maximum among all. 3.2.1 Delay of EDCF In Fig.9, there is no delay for the services HTTP and Remote login throughout the simulation. For video, the delay increases gradually and at a low rate. And for voice applications, the delay is maximum among all applications till the end of the simulation. Fig.11 Data Dropped by EDCF 3.2.4 Retransmission attempts by EDCF Fig.9. Delay of EDCF 3.2.2 Throughput of EDCF Fig.12 Retransmission attempts by EDCF In Fig.12, for HTTP, the retransmission attempts increase gradually and for remote login they show sharp increase and become almost constant. But for Fig.10. Throughput of EDCF real time applications, these attempts are more and they show sharp increase. But after that, these The Fig.10 shows the throughput for all traffic types attempts start decreasing for voice and become which is maximum for video applications which is almost constant for video. It concludes that 4,000,000 bits/sec and even after this value it retransmission attempts are maximum for video continues to increase. The throughput for all applications. applications is zero and constant initially which causes overlapping of lines and then increases 4. CONCLISION gradually for all. As compared to other applications, The results obtained from the simulations show that throughput of EDCF for Remote login is least. The EDCF performs better than PCF for different types throughput for HTTP greater than that of video but of services. It provides less delay and more after some time reverse is there. throughputs for delay sensitive applications such as voice and non-real time services such as HTTP. It is 97 | P a g e
  • 6. Manveer Kaur / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.093-098 because EDCF provides efficient service [10] Barlomeij Blaszczyszyn & Paul differentiation which is not provided by PCF and Muhlethaler, Performance of MAC hence can be efficiently adapted in VANETs. Due to Protocols in Linear VANETs under service differentiation, the lower priority traffic different Attenuation & Fading conditions, types may be starved and never get transmitted. PCF 12th International IEEE Conf. on Intelligent may be adapted for delay insensitive applications as Transportation Systems, St. Louis, USA, it shows better overall capacity and consider all 2009, 715-720. traffic types equivalently. We have not considered [11] Cuyu, C., Xiang Yong, Meilin, S., Lin the network conditions like fading and attenuation in Liang, Performance Observations on MAC the research work which can be the extension of this Protocols of VANETs in Intelligent research. Transportation System, WRI International Conference on Communications and REFERENCES Mobile Computing, Yunnan, 2009, 373 – [1] Jochen Schiller, Mobile Communication 379. (Institute of Informatics, Freuie [12] Sandeep Kaur, Dr. Jyotsna Sengupta, Universitat, Berlin, 2004). Performance Evaluation of IEEE 802.11e, [2] Gayathri Chandrasekaran, VANETs: The International Journal on Computer Science Networking Platform for Future Vehicular and Technology, 2(4), 2011,40-44. Applications, Department of Computer Science, Rutgers University, 2008. [13] Jong-Moon Chung, Minseok Kim, Yong- [3] H. Agustin Cozzetti, Riccardo M. Suk Park, Myungjun Choi, Sangwoo Lee Scopigno,Luca Casone, Giuseppe Barba, and Hyun Seo Oh, Time Coordinated V2I Mapcast: A Map-Constrained Broadcast Communications and Handover for WAVE Solution for VANETs, 6th IEEE Networks , IEEE Journal On Selected International Conf. on Wireless and Mobile Areas In Communications, 29(3), 2011, Computing, Networking and 545-558. Communications, Niagara Falls, Canada, 2010, 172-179. [4] Alexandru Oprea, A Survey and Qualitative Analysis of MAC Protocols for Vehicular Ad Hoc Networks, IEEE Wireless Communications, October 2006, pp.30-35. [5] Moustafa A. Youssef, Arunchandar Vasan, Raymond E. Miller, Specification and Analysis of the DCF and PCF Protocols in the 802.11 Standard Using Systems of Communicating Machines, Proc. 10th IEEE Conf. on Network Protocols, 2002, 132 – 141. [6] Praveen Durbha and Matthew Sherman, Quality of Service (QoS) in IEEE 802.11 Wireless Local Area Networks: Evaluation of Distributed Coordination Function (DCF) and Point Coordination Function (PCF). [7] Sunghyun Choi, Javier del Prado, Sai Shankar N, Stefan Mangold, IEEE 802.11e Contention-Based Channel Access(EDCF) Performance Evaluation,IEEE International Conf. on Communications, Anchorage, AK, 2003, 1151 - 1156. [8] IEEE 802.1d-1998, Part 3: Media Access Control (MAC) bridges, ANSI/IEEE Std. 802.1D, 1998 edition, 1998 [9] Yue Liu, Jun Bi, Ju Yang, Research on Vehicular Ad Hoc Networks, Chinese Control and Decision Conference, Guilin, 2009, 4430 – 4435. 98 | P a g e