scholarly journals Evaluation of Rate Adaptation Algorithms in IEEE 802.11 Networks

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1436 ◽  
Author(s):  
Ibrahim Sammour ◽  
Gerard Chalhoub

Wireless technologies are being used in various applications for their ease of deployment and inherent capabilities to support mobility. Most wireless standards supports multiple data rates that may vary between few Mbps to few Gbps. Reaching the maximum supported data rate is what most application seek for. Nevertheless, the choice of data rates is very closely related to the quality of communication links and their stability. IEEE 802.11 standard introduced multi-rate support, since then, a lot of research has been done on rate adaptation, dealing with the different parameters that lead to an estimation of the channel conditions and the metrics that affect the network performance. In this paper, we present some of the popular rate adaptation schemes and summarize their characteristics. We categorize them as well into different categories according to their design and functionalities in terms of the strategies that are used to estimate channel conditions and decision making. We implemented some algorithms from the different categories in the network simulator NS-3 in order to evaluate their performance under different scenarios in Ad hoc and infrastructure modes. We present the lessons learned as well as our insights for future research work that can enhance the current approaches in the literature.

2021 ◽  
pp. 1-11
Author(s):  
Thelma S. Horn

This paper is based on a Senior Scholar presentation delivered at the 2020 annual meeting of the North American Society for the Psychology of Sport and Physical Activity. The paper begins with a summary of the research work completed by the author and coinvestigators in regard to the influences that significant others (parents, peers, and coaches) exert on the psychosocial well-being of individuals in sport and physical activity. In each of these three areas, illustrative research studies are summarized in a predominantly chronological order with a commentary at the end of each section that identifies unanswered questions and suggests future research directions. In the second section, four particular lessons learned by the author over the course of a scholarly career are identified and explained.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2021 ◽  
Vol 16 (2) ◽  
pp. 301-320
Author(s):  
Rajan Roshan ◽  
Ambujakumari Santhosh

Most of the IT organizations are facing various challenges such as technological advancement, new customer requirements, merger & acquisition, and changing market demands, which should be addressed to survive in the industry. For enhancing more value to the customer in the project, the best option is to choose Agile Methodology for managing the project, which helps to accommodate the ad-hoc business requirement than pre-planned. Though, most of the organization, especially in the IT industry is shifting to Agile methodology practice, which helps to enjoy the benefit of better collaboration and customer experience. The study was conducted among 404 IT professionals from the IT corridors of India to understand the influence of Agile methodology on IT project performance. Most responses received from people who have sound experience in IT project management which assures the quality of results obtained. From study, it has been found that Agile methodology (b= 0.630, p<0.00) has a significant and positive impact on the project performance. Also, the study proves that people who are working in Scrum framework (Agile methodology) improves the project quality as well as business value. Based on Stepwise regression results, Product ownership has higher degree of importance than other independent variable for the individual work performance which solidifies the requirement for software development. Multicollinearity Assessment shows Product Ownership and Development Practice have more impact on project performance than Team considered for the study. Previous studies didn't cover the aspect as well as areas proposed in this study to arrive the conclusion of Scrum framework for project performance, and it opens the pathway for future research work.


Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


2020 ◽  
Vol 17 (4A) ◽  
pp. 588-597
Author(s):  
Ala'eddin Masadeh ◽  
Haythem Bany Salameh ◽  
Ahmad Abu-El-Haija

This work investigates the problem of managing the transmission power and assigning channels for multi-channel single-radio Cognitive Radio Ad-Hoc Networks (CRAHNs). The considered network consists of M primary users and N secondary users, where the secondary users can use the licensed channels opportunistically when they are not utilized by the primary users. The secondary users have the capability of sensing the licensed channels and determine their occupation status. They are also able to control their transmission power such that the transmitted data can be received with high quality-of-service with the lowest possible transmission power, and minimum interference among the secondary users. This also contributes in increasing the frequency spatial reuse of the licensed channels by the secondary users, when the channels are unoccupied, which increases the network throughput. This work proposes a channel assignment algorithm aims at assigning the unoccupied licensed channels among secondary users efficiently, and a transmission power control aims at tuning the transmission power used by the secondary users to maximize the network throughput. The results show an enhancement achieved by the proposed protocol when it is integrated to the considered network, which is seen through increasing the network throughput and decreasing in the access delay. In this context, the Network Simulator 2 (NS2) was used to verify our proposed protocol, which indicates a significant enhancement in network performance


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


2020 ◽  
pp. 768-775
Author(s):  
Pushpender Sarao ◽  

Vehicular ad-hoc networks is very popular research domain in which research work is going on at various aspects like routing the data without loss end-to-end. Routing in such networks is very tedious task due to frequently changing the position of vehicles location-wise. In this paper an intelligent model has been developed on the basis of adaptive neuro fuzzy system for OLSR routing protocol in VANET. The proposed model is designed based on input parameters average goodput and mac/phy-overhead. Based on these parameters, transmission power can be predicted. Triangular and Gaussian membership functions have been applied for designing the decision model. A comparison work also has been carried out for Gaussian, triangular functions and NS-3 based results. At the same time, the model is investigated by simulation work carried out on network simulator-3 (NS-3) platform.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


Author(s):  
Rinki Sharma ◽  
Govind Kadambi ◽  
Yuri A. Vershinin ◽  
K. N. Mukundan

Directional antennas have gained immense popularity among researchers working in the area of wireless networks. These antennas help in enhancing the performance of wireless networks through increased spatial reuse, extended communication range, energy efficiency, reduced latency, and communication reliability. Traditional Medium Access Control (MAC) protocols such as IEEE 802.11 are designed based on use of omnidirectional antennas. Therefore, suitable design changes are required to exploit the benefits of directional antennas in wireless networks. Though directional antennas provide many benefits to enhance network performance, their inclusion in the network also results in certain challenges in network operation. Deafness is one such problem that occurs among nodes using directional antennas. This chapter concentrates on the problem of deafness, which is introduced due to the use of directional antennas in wireless ad-hoc, sensor, and mesh networks. Many researchers have provided numerous solutions to deal with the problem of deafness in these networks. In this chapter, the authors first explain the problem of deafness and then present an extensive survey of solutions available in the literature to deal with the problem of deafness in wireless ad-hoc, sensor, and mesh networks. The survey is accompanied by a critical analysis and comparison of available solutions. Drawbacks of available solutions are discussed and future research directions are presented.


Sign in / Sign up

Export Citation Format

Share Document