Cross-Layer Congestion Control to Optimize the Performance of Wireless Ad Hoc Network

Authors

  • Smt. Meeta V. Prajapati  Department of Computer Engineering, Government Engineering College, Gandhinagar, Gujarat, India
  • Dr. S. M. Shah  Department of Computer Engineering, Government Engineering College, Gandhinagar, Gujarat, India

Keywords:

MAC, NS, DSDV, DSR, RTS, CTS, NAV, IEEE 802.11, AODV, RAS, CCS, CBR

Abstract

Wireless Ad hoc network become an emerging research area among researchers due to their flexibility and independence of network infrastructures. Ad hoc Networks are very useful in emergency search-and rescue operations, meetings or conventions in which persons wish to quickly share information, and data acquisition operations in inhospitable terrain. Also, in case of disaster or natural calamities, the deployment of a fixed infrastructure is neither feasible nor economically profitable for establishing communication among the rescue members, this paper briefly discusses the Rate Adaptation Scheme (RAS) and Congestion Control Scheme (CCS) using the DSDV Ad hoc routing protocol for wireless Ad hoc network. To improve the performance for Wireless Ad hoc Network, we propose a cross-layer design for congestion control which includes MAC/PHY and Network protocol stack. The MAC layer adaptively selects a transmission data rate based on the channel signal strength information from PHY layer and congestion information from Network Layer. The MAC layer utilization gathered at MAC layer is sent to DSDV as a congestion aware routing metric for up-to-date route. Implementation of Congestion Control is in Network Simulator 2 (NS 2). Finally we simulate the performance evaluation of DSDV and DSR Ad hoc routing protocols in terms of Throughput, Packet Delivery Ratio and End-to-End Delay which shows the performance of the network benefited from overall.

References

[1] RSA Labs. Public Key Cryptography Standards (PKCS)

[2] 2. Fast Variants of RSA By Dan Boneh and Hovav Shacham

[3] 3. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack By Ranald Cramer and Victor Shoup

[4] 4. Evaluation of Security Level of Cryptography : RSA-OAEP,RSA-PSS, RSA Signature By Alfred Menezes

[5] 5. Network and Internetwork security By William Stallings.

[6] 6. R. Rivest, A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems.”

[7] 7. M. Wiener. “Cryptanalysis of Short RSA Secret Exponents.” IEEE Trans. Information Theory 36(3):553–558. May 1990.Zd

[8] 8. A. Fiat. “Batch RSA.” In G. Brassard, ed., Proceedings of Crypto 1989, vol. 435 of LNCS, pp. 175–185. Springer-Verlag, Aug. 1989.

Downloads

Published

2014-12-25

Issue

Section

Research Articles

How to Cite

[1]
Smt. Meeta V. Prajapati, Dr. S. M. Shah, " Cross-Layer Congestion Control to Optimize the Performance of Wireless Ad Hoc Network, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.04-08, -2014.