IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET14112                                                     

Cross-Layer Congestion Control to Optimize the Performance of Wireless Ad Hoc Network


Smt. Meeta V. Prajapati, Dr. S. M. Shah
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Wireless Ad hoc network become an emerging research area among researchers due to their flexibility and independence of network infrastructures. Ad hoc Networks are very useful in emergency search-and rescue operations, meetings or conventions in which persons wish to quickly share information, and data acquisition operations in inhospitable terrain. Also, in case of disaster or natural calamities, the deployment of a fixed infrastructure is neither feasible nor economically profitable for establishing communication among the rescue members, this paper briefly discusses the Rate Adaptation Scheme (RAS) and Congestion Control Scheme (CCS) using the DSDV Ad hoc routing protocol for wireless Ad hoc network. To improve the performance for Wireless Ad hoc Network, we propose a cross-layer design for congestion control which includes MAC/PHY and Network protocol stack. The MAC layer adaptively selects a transmission data rate based on the channel signal strength information from PHY layer and congestion information from Network Layer. The MAC layer utilization gathered at MAC layer is sent to DSDV as a congestion aware routing metric for up-to-date route. Implementation of Congestion Control is in Network Simulator 2 (NS 2). Finally we simulate the performance evaluation of DSDV and DSR Ad hoc routing protocols in terms of Throughput, Packet Delivery Ratio and End-to-End Delay which shows the performance of the network benefited from overall.

Smt. Meeta V. Prajapati, Dr. S. M. Shah



[1] RSA Labs. Public Key Cryptography Standards (PKCS)

[2] 2. Fast Variants of RSA By Dan Boneh and Hovav Shacham

[3] 3. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack By Ranald Cramer and Victor Shoup

[4] 4. Evaluation of Security Level of Cryptography : RSA-OAEP,RSA-PSS, RSA Signature By Alfred Menezes

[5] 5. Network and Internetwork security By William Stallings.

[6] 6. R. Rivest, A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems.”

[7] 7. M. Wiener. “Cryptanalysis of Short RSA Secret Exponents.” IEEE Trans. Information Theory 36(3):553–558. May 1990.Zd

[8] 8. A. Fiat. “Batch RSA.” In G. Brassard, ed., Proceedings of Crypto 1989, vol. 435 of LNCS, pp. 175–185. Springer-Verlag, Aug. 1989.


Publication Details

Published in : Volume i | Issue i | November-December - 2014
Date of Publication Print ISSN Online ISSN
2014-12-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
04-08 IJSRSET14112   Technoscience Academy

Cite This Article

Smt. Meeta V. Prajapati, Dr. S. M. Shah, "Cross-Layer Congestion Control to Optimize the Performance of Wireless Ad Hoc Network", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume i, Issue i, pp.04-08, November-December-2014.
URL : http://ijsrset.com/IJSRSET14112.php