Comparison of the Maximal Spatial Throughput of Aloha and CSMA in Wireless Ad-Hoc Networks

نویسندگان

  • B. Blaszczyszyn
  • P. Mühlethaler
  • S. Banaouas
چکیده

Multiple communication protocols are used to organize transmissions from several sources (network nodes) in such a way that scheduled transmissions are likely to be successful. Aloha is one of the most common examples of such a protocol. A major characteristic of Aloha is its great simplicity: the core concept consists in allowing each source to transmit a packet and back-off for some random time before the next transmission, independently of other sources. The main idea of the Carrier-Sense Multiple Access technique (CSMA) is to listen before sending a packet. CSMA is perhaps the most simple and popular access protocol that integrates some collision avoidance mechanism.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Throughput Performance of ALOHA and CSMA MAC Protocol in Power for Wireless Ad Hoc Networks

Power conservation and throughput management is a major issue in Mobile Ad Hoc Networks. In the design of wireless ad hoc networks, various techniques are applied to efficiently allocate the scarce resources available for the communication links and the power control and throughput management is not related to any particular layer in the layered design communication protocol design. But most of...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

Improving LoRaWAN Performance Using Reservation ALOHA

LoRaWAN is one of the new and updated standards for IoT applications. However, the expected high density of peripheral devices for each gateway, and the absence of an operative synchronization mechanism between the gateway and peripherals, all of which challenges the networks scalability. In this paper, we propose to normalize the communication of LoRaWAN networks using a Reservation-ALOHA (R-A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012