Highly reliable MAC protocol optimisation design for data transmission in industrial wireless ad-hoc network

2016 ◽  
Vol 21 (2) ◽  
pp. 89
Author(s):  
Jun Wang ◽  
Jian Wang ◽  
Xinyu Zhang ◽  
Wanyi Xu
Author(s):  
Nobuyoshi Komuro ◽  
Ryo Manzoku ◽  
Kosuke Sanada ◽  
Jing Ma ◽  
Hiroo Sekiya

2011 ◽  
Vol 128-129 ◽  
pp. 534-537
Author(s):  
Hai Tao Wang ◽  
Zong Pu Jia ◽  
Qian Zhao

Wireless Ad Hoc Network is a distributed self-organizing networking with no infrastructure and central control. To probe the unknown environment and obtain the associated data, this paper offers a Multi-Strategy Data Transmission Scheme (MSDTS) for Ad-hoc network based on link queue, alternate node and ferry transmission. This kind of scheme has good performance on building link Ad-hoc network, data drop rate, average throughput of network.


2013 ◽  
Vol 765-767 ◽  
pp. 1956-1959
Author(s):  
Ming Ce Cheng ◽  
Ying Li

In order to solve the problem of the communication asymmetry problems in hybrid ad hoc network because of the introduction of directional antennas, we propose a hybrid MAC protocol termed DFMAC protocol, which achieving data transmission by one hop through the use of exchange RTS by multiple hops. The protocol takes the benefit of directional antennas and can be used by node equipped with Omni-directional antennas, simulation results show that the DFMAC protocol performs well in improving the network throughput.


Ad hoc network paved way to various researches and application due to its wide acceptance over wired network. The advance has also led to various drawbacks or problems that can result in unauthorized usage of data or in data loss. So secured data transfer has become an important requirement in any Ad hoc network. Various issues exist in Ad hoc network while data transmission and hence it has become a major requirement to develop an efficient routing protocol that can transmit the data securely over the network. So, this paper provides a solution, intend to develop an approach for making the data transmission more secured and feasible. This paper incorporates double encryption scheme to secure the data where we use Hybrid DNA based cryptosystem and blow fish algorithm for authentication of users. Also, we design an efficient optimal routing protocol that makes the transmission secured by reducing various attacks that occur in the network. It provides the security for image transmission over internet effectively. This technique also can be extended in multimedia security over the internet. The network parameters will be approximately judged in order to demonstrate the performance of the scheme we develop.


2013 ◽  
Vol 82 (13) ◽  
pp. 1-5
Author(s):  
Shalini Shrama ◽  
Mukesh Tiwari ◽  
Jaikaran Singh

Sign in / Sign up

Export Citation Format

Share Document