Preview

Network Simulator

Powerful Essays
Open Document
Open Document
1018 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Simulator
INTRODUCTION
IEEE 802.11 is the de facto standard for WLANs. It specifies both the medium access control (MAC) and the physical (PHY) layers for WLANs. The MAC layer operates on top of one of several physical layers. Medium access is performed using Carrier Sense Multiple Access with Collision Avoidance. However, simple CSMA is susceptible to the hidden node problem, especially in so called ad hoc networks where a node may communicate directly with every other node in range or using intermediate nodes as relays otherwise. Hidden nodes cause costly packet collisions and thus significantly affect network performance. In order to combat the hidden node problem, a mechanism known as Request to Send/Clear to Send (RTS/CTS) handshake is often used. RTS/CTS mechanism is supported in the IEEE 802.11 family of standards. The RTS/CTS mechanism was initially proposed in a protocol called Multiple- Access with Collision Avoidance (MACA). From a network point of view, one of the primary reasons for using the RTS/CTS mechanism is to avoid network congestion resulting from frequent packet collisions. Figure 1 depicts a conceptual “throughput versus Packet Size” curve for a network. In the presence of congestion, the throughput goes to zero as the Packet Size is increased beyond a certain value. A properly designed network, on the other hand, maintains the maximum throughput as the Packet Size goes to infinity.

LITERATURE REVIEW
The IEEE 802.11 standard includes an optional feature of the RTS/CTS (Request to Send/Clear to Send) function to control station access to the medium when collisions occur due to the hidden node. This option is also known as virtual carrier sensing. Through the proper use of RTS/CTS, you can fine-tune the operation of your wireless LAN since it solves the hidden node problem and provides additional protection against collisions. If you enable RTS/CTS on a particular station, it will refrain from sending a data frame until the station completes a



References: 1. E. Ayanoglu, S. Paul, T. F. LaPorta, K. K. Sabnani, and R. D.Gitlin, “AIRMAIL: A link-layer protocol for wireless networks,” ACMACM/Baltzer Wireless Networks J., vol. 1, pp. 47–60, Feb. 1995. 2. A. Bakre and B. R. Badrinath, “Handoff and system support for indirectTCP/IP,” in Proc. 2nd Usenix Symp. Mobile and Location-IndependentComputing, Apr. 1995. 3. S. Keshav, “REAL: A Network Simulator,” University of California at * Berkeley, Berkeley, CA, USA, Tech. Rep., 1988. * 4. V. Naoumov and A. Gross, “Simulation of Large Ad Hoc Networks,” In Proceedings of the 6th ACM Workshop on Modeling, Analysis, and * Simulation of Wireless and Mobile Systems, 2003.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) is the process used by non-switched Ethernet to detect a clear channel between devices helping to decrease the chance of data “colliding” during transmission. Utilizing MAC protocol, a devise will “listen” for other traffic between connected devises. If no traffic is detected, the device will pause (an added security against devices sending at the same time) and then send the data in the form of MAC protocol frames.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    After carefully interviewing the Stake holders of the Leonard Cooper Charter School, several issues were observed. The first noticeable concern was the print server. Their management of print jobs on the print server are called into question because of the many collisions on the print server. They are presently using a half-duplex system for their print jobs. A half-duplex system provides signal communication in both directions, however only one direction at a time. A good example of this technology might be two-way radios. The person listening must wait until the transmitter concludes the signal transmission before responding to the call otherwise a collision will occur and the entire message won't get received. In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data simultaneously. In the event of a network "collision", both transmitted packets are discarded. Collisions are a normal occurrence on Ethernets. To remedy this problem, an Ethernet standard was put into place called, "Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)" This allows network devices to "take turns" using the signal carrier line. When a device wants to transmit, it checks the signal level of the line to determine whether someone else is already using it. If it is already in use, the device waits and retries, perhaps in a few seconds. If it isn't in use, the device transmits. However, two devices can transmit at the same time in which case a collision occurs and both devices detect it. Each device then waits a random amount of time and retries until successful in getting the transmission sent. (Bryant, 2011).…

    • 1216 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Basios, C. and Solidakis, M. "Current trends and challenges towards wireless Internet", Computer Systems and Applications, 2005. The 3rd ACS/IEEE International Conference on 2005 Page(s):77…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    Local Area Networks, or LANs, are a gathering of PCs networked together in a by and large little geographic area. LAN innovation alludes to the equipment and programming used to make a local area network. The most widely recognized wired systems are Ethernet and Token Ring, and WLAN advances utilizing IEEE 802.11. WAN or Wide Area Network advancements incorporate ATM. TCP/IP, and Frame Relay to join and exchange information crosswise over expansive separations. Utilizing a link, for example, an Ethernet link PCs on a LAN are obliged to impart the network when passing information bundles forward and backward. Before sending information over the network every PC checks the line for different transmissions. On the off chance that the line is pass the PC sends the information, if not the PC holds up. This technique is called CSMA/CD. Remote LANs or WLANs use RF signs to transmit information over the network. Each PC on a remote local area network have the same recurrence and alternate sending information simply like utilizing a link. Remote LANs use CSMA/CA to check for an open line of correspondence to it expected target. The sending gadget will convey a sign to the getting gadget called a Request to Send. In the event that the getting gadget is accessible it will send an unmistakable to send flag back to the host and to every other gadget on the network. This alarms alternate gadgets that there is a transmission between gadget An and B and that they must hold up to send information over the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    802.21

    • 2871 Words
    • 12 Pages

    | E. Piri and K. Pentikousis, "IEEE 802.21," Cisco, [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-2/122_ieee.html. [Accessed 19 3 2013].…

    • 2871 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Best Essays

    white paper template 1

    • 963 Words
    • 4 Pages

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 963 Words
    • 4 Pages
    Best Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Last and forth most is determining the location of the wireless devices, as there are many different object that hinder the signal of the access point with all mode from Ad hoc to the standard infrastructure. While they all can be affected, each has special consideration to their locations.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mobile And Wireless

    • 455 Words
    • 1 Page

    The foundation of any network is some sort of pathway for digital data (bits) to move back and forth between connected agents. Cables, ranging from coaxial to optical, have long dominated this realm. However, wireless is increasingly emerging as a viable alternative to direct physical connection (Stanford University, 2003). Wireless includes many various mediums such as AM, FM, HD and SiriusXM radio. Broadcast and satellite TV, and most, if not all, internet access and cellphones, are now wireless.…

    • 455 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The total cost of the proposed collection systems is estimated to be around 80 million rupees for the fixed cost of storage bins, col-…

    • 4095 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Control Network Protocol

    • 1935 Words
    • 8 Pages

    The IP Control Protocol (IPCP) is responsible for configuring, enabling, and disabling the IP protocol modules on both ends of the point-to-point link. IPCP uses the same packet…

    • 1935 Words
    • 8 Pages
    Powerful Essays