ME-MAC Protocol for MAC Layer in MANET to Overcome HET Problem

Main Article Content

Dr. S. Hemalatha
Dr. Harikumar Pallathadka
Prof. Rajesh P Chinchewadi

Abstract

Medium Access layer in Mobile Adhoc Network is responsible of transmission of packet through the wireless medium, while transmitting the packet all nodes has to intellect the medium before sending the packet. Every node can able to transmit the packet when the medium if free otherwise the nodes have to wait until the medium becomes free. Some cases the transmission range of the node can be idle but due to Hidden and Exposed node, the node could not be sending the packet to other nodes. Node has to wait unnecessarily event the transmission medium is free. This research article proposed the Mutual Exclusion MAC protocol for avoiding hidden and exposed terminal problem in MANET. The proposed protocol is implemented with the support of Network simulator 3 and results are compared with the existing different protocol proposed for the MAC layer with the parameter and better results shown.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Dr. S. Hemalatha, Dr. Harikumar Pallathadka, and Prof. Rajesh P Chinchewadi , Trans., “ME-MAC Protocol for MAC Layer in MANET to Overcome HET Problem”, IJDCN, vol. 3, no. 4, pp. 1–6, Mar. 2024, doi: 10.54105/ijdcn.B5034.03040623.
Section
Articles

How to Cite

[1]
Dr. S. Hemalatha, Dr. Harikumar Pallathadka, and Prof. Rajesh P Chinchewadi , Trans., “ME-MAC Protocol for MAC Layer in MANET to Overcome HET Problem”, IJDCN, vol. 3, no. 4, pp. 1–6, Mar. 2024, doi: 10.54105/ijdcn.B5034.03040623.
Share |

References

R. Ramanathan and J. Redi, 9 (2002) “A Brief Overview of ad hoc networks: challenges and Directions,” IEEE Commun. Mag., vol. 40, no. 5, May. 2002. https://doi.org/10.1109/MCOM.2002.1006968

Dr. James A. ,Joseph P. Macker Freebersyser,Advanced Technology Office Defense Advanced Research Projects Agency, “ Overview of CBMANET, ITMANET for WAND proposer Day meeting” Feb27, 2007

Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong (2012),” A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks” in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008

Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, (2010)“COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS” JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.

Ms. Ritu Patidar, Prof. Dinesh Chandra Jain,(2012) “ Solving the Hidden Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Adhoc Networks” ijarcsse, Volume 2, Issue 5, May 2012.

CaiZ J Lu M, Wang X D. Channel access-based self-organized clustering in ad hoc networks. IEEETransactions on Mobile Computing 2003; 2(2): 102-113. https://doi.org/10.1109/TMC.2003.1217231

Khaled H. Almotairi and Xuemin (Sherman) Shen, “Multichannel medium access control for adhoc wireless networks” WIRELESS COMMUNICATIONS AND MOBILE COMPUTING(2011). https://doi.org/10.1002/wcm.1159

Ketema Adere, Rammurthy, “Solving the Hidden and Exposed Terminal problems Using Directional-Antenna Based MAC Protocol for Wireless Sensor Networks” 7th International Conference on Wireless and Optical Communication Networks, Colombo(2010). https://doi.org/10.1109/WOCN.2010.5587352

Ki Hong Kim, Daejeon, Korea, “Security Attack based on Control Packet Vulnerability in Cooperative Wireless Networks” The Ninth International Conference on Networking and Services 2013.

Caishi Huang , Chin-Tau Lea , Albert Kai-Sun Wong,” A joint solution for the hidden and exposed terminal problems in CSMA/CA wireless networks” in ELSEVIER,17 June, 2012. https://doi.org/10.1016/j.comnet.2012.06.008

Viral V. Kapadia, Sudarshan N. Patel and Rutvij H. Jhaveri, “COMPARATIVE STUDY OF HIDDEN NODEPROBLEM AND SOLUTION USING DIFFERENT TECHNIQUES AND PROTOCOLS” JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151- 9617.

Chen J, Sheu S, Yang C. ( 2003) A new multichannel access protocol for IEEE 802.11 ad hoc wireless LANs.Proc IEEE PIMRC 2003. 2003; 2291-2296.

J Garcia-Luna-Aceves Z. Tang, (1999) Hop- Reserva tion multiple access (HRMA) for Ad-hoc netw orks, in: Proceedings of the IEEE Infocom 1999.

T. Safadawi and S. Xu , (2001) IEEE 802.11 MAC Protocol MAC Protocol work well in multihop WirelessAd-hoc networks, IEEE Communicati on maga-zine, pp. 130-137, June 2001. https://doi.org/10.1109/35.925681

https://en.wikipedia.org/wiki/Venn_diagram.

Madhuri, M. V., & Sangameswar, Dr. M. V. (2019). Encryption Technique to Optimize Information Leakage in Multi Cloud Storage Services. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6s, pp. 1078–1081). https://doi.org/10.35940/ijeat.f1002.0886s19

Thapar, S., & Sharma, S. K. (2020). Wormhole Attack Isolation Access from Mobile Ad hoc Network with Delay Prediction Method. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 6, pp. 3672–3680). https://doi.org/10.35940/ijrte.f8230.038620

Khan, I., & Gite, Dr. P. (2022). Detecting Malicious Nodes in Mobile Ad hoc Networks - A Review. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 6, pp. 1–3). https://doi.org/10.35940/ijese.d2527.0510622

Pramod, K., Mrs. Durga, M., Apurba, S., & Shashank, S. (2023). An Efficient LEACH Clustering Protocol to Enhance the QoS of WSN. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 3, Issue 3, pp. 1–8). https://doi.org/10.54105/ijainn.a3822.043323

Hemalatha, Dr. S., Pallathadka, Dr. H., & Chinchewadi, Prof. R. P. (2023). Proposed Mutual Exclusion MAC Protocol for MANET to Overcome Hidden and Exposed Terminal Problem. In Indian Journal of Data Communication and Networking (Vol. 3, Issue 6, pp. 1–4). https://doi.org/10.54105/ijdcn.f4238.103623