Título: Broadcasting Traffic Load Performance Analysis of 802.11 MAC in Mobile Ad hoc Networks (MANET) Using Random Waypoint Model (RWM)
Autores: kumar, jogendra; CSED
Fecha: 2012-07-22
Publicador: International journal of information and network security
Fuente:
Tipo: info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Tema: No aplica
Descripción: Wireless networks are playing a major role in the area of wireless communication. Ad hoc network is a collection of wireless nodes that are communicate from one node to other  nodes without using any existing infrasturacture , access point, and centralized network. The wireless communication devices are transmitters, receivers and smart antennas.  These antennas can be of any kind and nodes can be fixed or mobile. The term node referred to as, which are free to move arbitrarily in every direction. In this article showing the pefromance of 802.11 MAC on basis of broadcasting traffic load using random waypoint model In wireless mobile ad hoc network (MANET) . this article main aim showing effictive performance of constant bit  rate based on broadcasting data from one network to other network. Mainly this article focus on the performance metric such as 80.11 MAC Broadcast packet sent to channel, Packet from network layar, Broadcast packets received, 802.11 MAC Unicast packet sent to channel,Unicast packets received clearly.
Idioma: Inglés

Artículos similares:

Developing a Secure Programming Module to cope with Modern Vulnerabilities por McKelvey, Nigel; Letterkenny Institute of Technology
New GSM, DCS and GSM/DCS Pifa Antennas Designs for Wireless Networks Applications por Mehadji, Abri; Tlemcen university,Belgacem, N; Tlemcen university,Belgacem, W; Tlemcen university
A New Proxy Blind Signature Scheme Based on DLP por VERMA, SWATI; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)",Sharma, Birendra Kumar; "Pt.Ravishankar Shukla University, Raipur(Chhattisgarh)"
A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model por Chitrey, Anubhav; Department of Information Security & Cyber Law Indian Institute of Information Technology Allahabad, India,Singh, Dharmendra,Singh, Vrijendra
Synthetic Feature Transformation with RBF neural network to improve the Intrusion Detection System Accuracy and Decrease Computational Costs por Asgari Taghanaki, Saeid; IAU Majlesi,Zamani Dehkordi, Behzad,Hatam, Ahmad,Bahraminejad, Behzad
Fast Mapping Method based on Matrix Approach For Elliptic Curve Cryptography por El Kinani, El Hassan; Groupe algèbre et Applications Département de Mathématiques Faculté des Sciences et Techniques Univesité Moulay Ismaïl Errachidia. Maroc.
10