We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Efficient Channel Access Techniques for Next Generation Mobile Networks

by P. Bonus Reddy, P. Venkata Krishna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 2
Year of Publication: 2017
Authors: P. Bonus Reddy, P. Venkata Krishna
10.5120/ijca2017915496

P. Bonus Reddy, P. Venkata Krishna . Efficient Channel Access Techniques for Next Generation Mobile Networks. International Journal of Computer Applications. 175, 2 ( Oct 2017), 34-40. DOI=10.5120/ijca2017915496

@article{ 10.5120/ijca2017915496,
author = { P. Bonus Reddy, P. Venkata Krishna },
title = { Efficient Channel Access Techniques for Next Generation Mobile Networks },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 175 },
number = { 2 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number2/28463-2017915496/ },
doi = { 10.5120/ijca2017915496 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:00.796205+05:30
%A P. Bonus Reddy
%A P. Venkata Krishna
%T Efficient Channel Access Techniques for Next Generation Mobile Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 2
%P 34-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Attributed to the explosion in the number of mobile users, an imposition on the limits of bandwidth emerged that deliberately affects the network performance. Further, because of increasing applications it is essential to assure bandwidth and low delay. Existing Congestion Avoidance routing protocols select path guaranteeing delay and bandwidth. However, there are channel variations through which it fails to pass the information between the nodes. To overcome these concerns, we have proposed a cross-layer TDMA-based routing protocol to meet delay and bandwidth requirements. Further to cope with issues such as reliability and channel accessibility we have integrated AODV protocol along with the cross-layer TDMA. Also, to reduce cost and packet loss we have incorporated multi-path routing methods.

References
  1. R. Sharma, D. G. Singh, and R. Agnihotri, “Comparison of performance analysis of 802.11a, 802.11b and 802.11g standard,” (IJCSE) International Journal on Computer Science and Engineering, vol. 02, pp. 2042 - 2046, 2010.
  2. J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach, 5th ed. Addison - Wesley, 2010.
  3. Er Liu, Multiple Access Methods Multiple Access Methods, Helsinki University of Technology Helsinki University of Technology S-72.333, Postgraduate Seminar on Radio Communications.
  4. P. S. Tomar and P. G. Poonacha, "An efficient channel access method using polling and dynamic priority assignment," 2013 4th International Conference on Computer and Communication Technology (ICCCT), Allahabad, 2013, pp. 145-150.
  5. I. Rhee, A. Warrier, J. Min, and L. Xu, “DRAND: distributed randomized TDMA scheduling for wireless ad-hoc networks,” in Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC ’06), pp. 190–201, May 2006.
  6. Rupesh Singh, Multiple Access Techniques For 4G Mobile Wireless Networks, International Journal of Engineering Research and Development, Volume 5, Issue 11 (February 2013), PP. 86-94
  7. SanjivTokekar, NeeteshPurohit, Analysis of a New Fixed Channel Allocation Scheme for a Sectorized GSM Cellular Network, Proc. of International Conference on Wireless and Optical Communications Networks (IFIP’06), 2006, pp.1 – 5.
  8. P. V. Krishna, N. C. S. N. Iyengar, S. Misra, An Efficient Hash Table-Based Node Identification Method for Bandwidth Reservation in Hybrid Cellular and Ad-Hoc Networks, Computer Communications (Elsevier), Vol. 31, No. 4, 2008, pp. 722-733.
  9. Lin, L., Wong, K. J., Kumar, A., Tan, S. L., &Phee, S. J. (2011, June). An energy efficient MAC protocol for mobile in-vivo body sensor networks. In Ubiquitous and Future Networks (ICUFN), 2011 Third International Conference on (pp. 95-100). IEEE.
  10. Yan, Z., & Liu, B. (2011, July). A context aware MAC protocol for medical Wireless Body Area Network. In Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International IEEE Conference, (pp. 2133-2138).
  11. Kwak, K. S., Ullah, S., &Ullah, N. (2010, November). An overview of IEEE 802.15. 6 standard, In Applied Sciences in Biomedical and Communication Technologies (ISABEL), 2010 3rd International Symposium on (pp. 1-6). IEEE.
  12. Ameen, M. A., Ullah, N., &Kwak, K. (2011, October). Design and analysis of a MAC protocol for wireless body area network using wakeup radio. In Communications and Information Technologies (ISCIT), 2011 11th International Symposium on (pp. 148-153). IEEE.
  13. NF Timmons and WG Scanlon. An adaptive energy efficient mac protocol for the medical body area network. In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, 2009. Wireless VITAE 2009. 1st International Conference on, pages 587593. IEEE, 2009.
  14. H. Rahul, F. Edalat, D. Katabi, and C. Sodini. Frequency-aware rate adaptation and mac protocols. In Mobicom, 2009.
  15. A. Dutta, D. Saha, D. Grunwald, and D. Sicker. SMACK: a smart acknowledgment scheme for broadcast messages in wireless networks. In SIGCOMM ’09., New York, NY, USA, 2009. ACM.
  16. B.-S. Kim, S. W. Kum, and R. L. Ekl. Ofdma-based reliable multicasting mac protocol for wlans. IEEE Transactions on Vehicular Technology, 57(5), 2008.
  17. Mohammad Anbar and D P Vidyarthi, “On Demand Bandwidth Reservation for Real-Time Traffic in Cellular IP Network using Particle Swarm Optimization”, International Journal of Business Data Communications and Networking, Volume 5, Issue 3, 53-66, July – September 2009.
  18. Anderson J. B., T. S.Rappaport, and S. Yoshida, (1995), Propagation measurement and models for wireless communication channels. Communications Magazine, IEEE 33.1, 42-49.
  19. David Espes, ZoubirMammeri, Delay and Bandwidth constrained Routing with Throughput optimization in TDMA-based MANETs, 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, 2009, pp. 1-5.
  20. W.H. Liao, Y.C. Tseng, K.P. Shih, “A TDMA-Based Bandwidth Reservation Protocol for QoS Routing in a Wireless Mobile Ad Hoc Network”, IEEE International Conference on Communications, 2002.
  21. R.K. Ahuja, T.L. Magnanti, J.B. Orlin, Network Flows: Theory, Algorithms, and Applications, Prentice Hall, Englewood Cliffs NJ, 1993.
  22. C. E. Perkins, E. M. Belding-Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, July 2003.
  23. C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, pages 173–219. Addison-Wesley, 2000.
  24. Ian D. Chakeres, Elizabeth M. Belding-Royer, AODV Routing Protocol Implementation Design, Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04), p.698-703, March 23-24, 2004
  25. Jack Tsai and Tim Moors, A Review of Multipath Routing Protocols: From Wireless Ad Hoc to Mesh Networks, National ICT Australia (NICTA), University of New South Wales, Australia.
  26. G. Kanagaraj, S.G. Ponnambalam, N. Jawahar, A hybrid cuckoo search and genetic algorithm for reliability–redundancy allocation problems, Computers & Industrial Engineering, Volume 66, Issue 4, December 2013, Pages 1115–1124.
Index Terms

Computer Science
Information Sciences

Keywords

Channel Access Methods TDMA Cross-layer TDMA AODV Routing Multipath routing.