Preview

Network Simulator

Powerful Essays
Open Document
Open Document
1018 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Simulator
INTRODUCTION
IEEE 802.11 is the de facto standard for WLANs. It specifies both the medium access control (MAC) and the physical (PHY) layers for WLANs. The MAC layer operates on top of one of several physical layers. Medium access is performed using Carrier Sense Multiple Access with Collision Avoidance. However, simple CSMA is susceptible to the hidden node problem, especially in so called ad hoc networks where a node may communicate directly with every other node in range or using intermediate nodes as relays otherwise. Hidden nodes cause costly packet collisions and thus significantly affect network performance. In order to combat the hidden node problem, a mechanism known as Request to Send/Clear to Send (RTS/CTS) handshake is often used. RTS/CTS mechanism is supported in the IEEE 802.11 family of standards. The RTS/CTS mechanism was initially proposed in a protocol called Multiple- Access with Collision Avoidance (MACA). From a network point of view, one of the primary reasons for using the RTS/CTS mechanism is to avoid network congestion resulting from frequent packet collisions. Figure 1 depicts a conceptual “throughput versus Packet Size” curve for a network. In the presence of congestion, the throughput goes to zero as the Packet Size is increased beyond a certain value. A properly designed network, on the other hand, maintains the maximum throughput as the Packet Size goes to infinity.

LITERATURE REVIEW
The IEEE 802.11 standard includes an optional feature of the RTS/CTS (Request to Send/Clear to Send) function to control station access to the medium when collisions occur due to the hidden node. This option is also known as virtual carrier sensing. Through the proper use of RTS/CTS, you can fine-tune the operation of your wireless LAN since it solves the hidden node problem and provides additional protection against collisions. If you enable RTS/CTS on a particular station, it will refrain from sending a data frame until the station completes a



References: 1. E. Ayanoglu, S. Paul, T. F. LaPorta, K. K. Sabnani, and R. D.Gitlin, “AIRMAIL: A link-layer protocol for wireless networks,” ACMACM/Baltzer Wireless Networks J., vol. 1, pp. 47–60, Feb. 1995. 2. A. Bakre and B. R. Badrinath, “Handoff and system support for indirectTCP/IP,” in Proc. 2nd Usenix Symp. Mobile and Location-IndependentComputing, Apr. 1995. 3. S. Keshav, “REAL: A Network Simulator,” University of California at * Berkeley, Berkeley, CA, USA, Tech. Rep., 1988. * 4. V. Naoumov and A. Gross, “Simulation of Large Ad Hoc Networks,” In Proceedings of the 6th ACM Workshop on Modeling, Analysis, and * Simulation of Wireless and Mobile Systems, 2003.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    Carrier Sensed Multiple Access with Collision Detection (CSMA/CD) is the process used by non-switched Ethernet to detect a clear channel between devices helping to decrease the chance of data “colliding” during transmission. Utilizing MAC protocol, a devise will “listen” for other traffic between connected devises. If no traffic is detected, the device will pause (an added security against devices sending at the same time) and then send the data in the form of MAC protocol frames.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    After carefully interviewing the Stake holders of the Leonard Cooper Charter School, several issues were observed. The first noticeable concern was the print server. Their management of print jobs on the print server are called into question because of the many collisions on the print server. They are presently using a half-duplex system for their print jobs. A half-duplex system provides signal communication in both directions, however only one direction at a time. A good example of this technology might be two-way radios. The person listening must wait until the transmitter concludes the signal transmission before responding to the call otherwise a collision will occur and the entire message won't get received. In a half-duplex Ethernet network, a collision is the result of two devices on the same Ethernet network attempting to transmit data simultaneously. In the event of a network "collision", both transmitted packets are discarded. Collisions are a normal occurrence on Ethernets. To remedy this problem, an Ethernet standard was put into place called, "Carrier Sense Multiple Access/ Collision Detect (CSMA/CD)" This allows network devices to "take turns" using the signal carrier line. When a device wants to transmit, it checks the signal level of the line to determine whether someone else is already using it. If it is already in use, the device waits and retries, perhaps in a few seconds. If it isn't in use, the device transmits. However, two devices can transmit at the same time in which case a collision occurs and both devices detect it. Each device then waits a random amount of time and retries until successful in getting the transmission sent. (Bryant, 2011).…

    • 1216 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Week 3 iLab Report

    • 1123 Words
    • 4 Pages

    Ciampa, M. (2013). WNA Guide to Wireless LAN’s (3rd ed.). [VitalSource Bookshelf]. Retrieved from http://www.devryu.net/…

    • 1123 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Encapsulation 18.MAC address 19.IP address 20.Physical Layer 21.Wi-Fi Alliance 22.Frames used in which layer? 23.Packets used in which layer? Chapter 4 24.LANs 25.WANs 26.AC signal, DC signal 27.Electric cicuit connecting twonodes in a network 28.Full duplex transmission 29.Attenuation 30.Single-mode, Multi-mode cables 31.802.11g 32.CSMA/CA 33.Fiber optic cables 34.Shielded twisted pair cable vs. Unshielded twisted pair cable 35.Straight-through, Crossover cable 36.UTP, Coax, Single-mode (SM),Multi-mode (MM) cables – max. distance 37.Ethernet max distance per IEEE standard 38.Network troubleshooting using TCP/IP model Chapter 5 39.Ethernet 40.802.3, 802.11 41.Ethernet bit rate 42.10BaseTx standard 43.Access Layer switches 44.Devices on network link with different speeds 45.Error handling of frame in receiving device 46.Unicast, Multicast, Broadcast 47.MAC address table 48.…

    • 720 Words
    • 7 Pages
    Satisfactory Essays
  • Best Essays

    IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std. 802.1X (2004).…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Good Essays

    | |containing success or failure |mechanisms of the 802.11 standard also |management frames are still |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    Local Area Networks, or LANs, are a gathering of PCs networked together in a by and large little geographic area. LAN innovation alludes to the equipment and programming used to make a local area network. The most widely recognized wired systems are Ethernet and Token Ring, and WLAN advances utilizing IEEE 802.11. WAN or Wide Area Network advancements incorporate ATM. TCP/IP, and Frame Relay to join and exchange information crosswise over expansive separations. Utilizing a link, for example, an Ethernet link PCs on a LAN are obliged to impart the network when passing information bundles forward and backward. Before sending information over the network every PC checks the line for different transmissions. On the off chance that the line is pass the PC sends the information, if not the PC holds up. This technique is called CSMA/CD. Remote LANs or WLANs use RF signs to transmit information over the network. Each PC on a remote local area network have the same recurrence and alternate sending information simply like utilizing a link. Remote LANs use CSMA/CA to check for an open line of correspondence to it expected target. The sending gadget will convey a sign to the getting gadget called a Request to Send. In the event that the getting gadget is accessible it will send an unmistakable to send flag back to the host and to every other gadget on the network. This alarms alternate gadgets that there is a transmission between gadget An and B and that they must hold up to send information over the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    show that the proposed framework is fast (two rounds of communication among nodes, regardless of network size) and outperforms an existing method.…

    • 8009 Words
    • 33 Pages
    Good Essays
  • Powerful Essays

    802.21

    • 2871 Words
    • 12 Pages

    | E. Piri and K. Pentikousis, "IEEE 802.21," Cisco, [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_12-2/122_ieee.html. [Accessed 19 3 2013].…

    • 2871 Words
    • 12 Pages
    Powerful Essays
  • Best Essays

    white paper template 1

    • 963 Words
    • 4 Pages

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 963 Words
    • 4 Pages
    Best Essays
  • Satisfactory Essays

    Wireless Network

    • 268 Words
    • 2 Pages

    Last and forth most is determining the location of the wireless devices, as there are many different object that hinder the signal of the access point with all mode from Ad hoc to the standard infrastructure. While they all can be affected, each has special consideration to their locations.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro’s and con’s. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other buyers. Peer-to-peer networks should be installed in very small businesses, and since this is a small business, it should fit perfectly. They are inexpensive to set up , which is what Fred needs. A peer-to-peer network can support about ten clients and that should be plenty. The key thing to remember about peer-to-peer networking is that it shares files and printers as inexpensively as possible; y. Since Fred’s users are allowed to control access to the resources on their own computers. One thing that you have to be careful with…

    • 453 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The total cost of the proposed collection systems is estimated to be around 80 million rupees for the fixed cost of storage bins, col-…

    • 4095 Words
    • 17 Pages
    Powerful Essays