Cross-Layer Congestion Control to Optimize the Performance of Wireless Ad Hoc Network
Keywords:
MAC, NS, DSDV, DSR, RTS, CTS, NAV, IEEE 802.11, AODV, RAS, CCS, CBRAbstract
Wireless Ad hoc network become an emerging research area among researchers due to their flexibility and independence of network infrastructures. Ad hoc Networks are very useful in emergency search-and rescue operations, meetings or conventions in which persons wish to quickly share information, and data acquisition operations in inhospitable terrain. Also, in case of disaster or natural calamities, the deployment of a fixed infrastructure is neither feasible nor economically profitable for establishing communication among the rescue members, this paper briefly discusses the Rate Adaptation Scheme (RAS) and Congestion Control Scheme (CCS) using the DSDV Ad hoc routing protocol for wireless Ad hoc network. To improve the performance for Wireless Ad hoc Network, we propose a cross-layer design for congestion control which includes MAC/PHY and Network protocol stack. The MAC layer adaptively selects a transmission data rate based on the channel signal strength information from PHY layer and congestion information from Network Layer. The MAC layer utilization gathered at MAC layer is sent to DSDV as a congestion aware routing metric for up-to-date route. Implementation of Congestion Control is in Network Simulator 2 (NS 2). Finally we simulate the performance evaluation of DSDV and DSR Ad hoc routing protocols in terms of Throughput, Packet Delivery Ratio and End-to-End Delay which shows the performance of the network benefited from overall.
References
[1] RSA Labs. Public Key Cryptography Standards (PKCS)
[2] 2. Fast Variants of RSA By Dan Boneh and Hovav Shacham
[3] 3. A Practical Public Key Cryptosystem Provably Secure against Adaptive
Chosen Ciphertext Attack By Ranald Cramer and Victor Shoup
[4] 4. Evaluation of Security Level of Cryptography : RSA-OAEP,RSA-PSS, RSA
Signature By Alfred Menezes
[5] 5. Network and Internetwork security By William Stallings.
[6] 6. R. Rivest, A. Shamir, and L. Adleman. “A Method for Obtaining Digital
Signatures and Public Key Cryptosystems.â€
[7] 7. M. Wiener. “Cryptanalysis of Short RSA Secret Exponents.†IEEE Trans.
Information Theory 36(3):553–558. May 1990.Zd
[8] 8. A. Fiat. “Batch RSA.†In G. Brassard, ed., Proceedings of Crypto 1989,
vol. 435 of LNCS, pp. 175–185. Springer-Verlag, Aug. 1989.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET
This work is licensed under a Creative Commons Attribution 4.0 International License.