IJCNIS Vol. 7, No. 2, 8 Jan. 2015
Cover page and Table of Contents: PDF (size: 381KB)
Full Text (PDF, 381KB), PP.50-58
Views: 0 Downloads: 0
MANET, MAC, Co-operation, Helper-Feedback, Reliable
A novel multirate media access control based co-operative scheme has been proposed. It has been observed that any co-operative scheme gives a better performance only if the helper nodes selected to, relay the transmission from source to destination are reliable enough. Murad Khalid et.al has already proposed a protocol [24] where more than one helper nodes are selected to improve the reliability, so that if one fails the other can be used as a backup. But in this paper focus is on selection of reliable helpers. If a helper node has a high data rate, has successfully relayed traffic in the past and also has some minimum amount of energy left , not only for relaying traffic for others but also to conduct its own transmissions, then it acts as a suitable candidate to be chosen as a helper node. Such a co-operatives scheme enhances the throughput, reliability and overall performance of the network.Simulation has been conducted to show that the proposed scheme performs better than the
Nidhi Newalkar, Piyush Kumar Shukla, Sanjay Silakari, "Helper Feedback based Medium Access Control Protocol: A Reliable Co-operative MAC Scheme for MANET", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.2, pp.50-58, 2015. DOI:10.5815/ijcnis.2015.02.06
[1]A. Kamerman and L. Monteban, “WLAN-II: A high performance wireless LAN for the unlicensed band,” Bell Labs Technical Journal, summer 1997.
[2]A. Nosratinia, T.E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Communications Magazine, vol. 42, no. 10, pp. 74–80, April 2004.
[3]H. Zhu and G. Cao, “rDCF: A relay-enabled medium access control protocol for wireless ad-hoc networks,” in Proceedings of IEEE INFOCOM, 2005.
[4]Nidhi Newalkar, Sanjay Silakari and Piyush Kumar Shukla, “A Reliable Co-operative MAC Scheme with Helper Feedback”. International Joint Conferences on CIIT 2012,CENT 2012, CSPE 2012 & CIITCom 2012 Springer LNICST pp. 192-197, Chennai, 3 – 4 Dec . 2012.
[5]A. Sendonaris, E. Erkip and B. Aazhang, “User Cooperation Diversity , Part I: System , IEEE Transactions on Communications , vol. 51, no. 11, Nov. 2003.
[6]J.M. Bahi, M. Eskandar and A. Mostefaoui, “A robust cooperation approach for mobile multimedia ad-hoc networks”, IEEE 2008.
[7]Klaus Fosmark, “Cooperative Communication in Mesh Networking”, Available :
http://grouper.ieee.org/groups/802/15/pub/05/15-05-0129-00-0005-cooperative-communication-in-mesh-networking.ppt
[8]Long Cheng, Jiannong Cao, Canfeng Chen, Hongyang Chen, Jian Ma and Joanna Izabela Siebert, “Cooperative contention-based forwarding for wireless sensor networks”. IWCMC, July 2010, Caen, France.
[9]Tingting Chen and Liehuang Zhu, “Stimulating co-operation in vehicular ad-hoc Network: A coalitional game theoretic approach”. IEEE Transactions on Vehicular Technology Vol 60, No. 2 February 2011.
[10]Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari, “Attack Resilient & Adaptive Medium Access Control Protocol, ” IJCSIS (International Journal of Computer Science & Engineering), Vol. 11. No. 03, March, 2013.
[11]J.N. Laneman, G. W. Womell, and D. N. C. Tse, “An efficient protocol for realizing cooperative diversity in wireless networks,” in Proc. IEEE International Symposium on Information Theory (ISIT), June 2001.
[12]J. N. Laneman and G. W. Wornell, Energy- efficient antenna sharing and relaying for wireless networks,” in Proc. IEEE wireless communications and networking, Sept. 2000.
[13]T. M. Cover and A. A. E. Gamal, “Capacity theorems for the relay channel,” IEEE Transactions on Information Theory vol. 25, no. 5. Sept 1979.
[14]A. Sendonaris, E. Erkip and B. Aazhang, “User Cooperation Diversity , Part I : System , IEEE Transactions on Communications , vol. 51, no. 11, Nov. 2003
[15]H. Zhu and G. Cao, “On improving the performance of IEEE 802.11 with relay-enabled PCF,” Mobile Networking Appl. (MONET), vol. 9, no. 4, pp. 423–434, Aug. 2004.
[16]P. Liu, Z Tao and S. Narayan, “CoopMAC A co-operative MAC for wireless LANs”. IEEE J. Sel. Areas Communication vol. 25 Feb 2007.
[17]J. S. Pathmasuntharam, A. Das, and K. Gupta, “Efficient multi-rate relaying (EMR) MAC protocol for ad hoc networks,” in Proc. Of IEEE ICC’05, Seoul, Korea, July 2005.
[18]Brett Hagelstein , Mehran Abolhasan, Daniel Franklin and FarzadSafaei, “An efficient opportunistic cooperative diversity protocol for IEEE 802.11 networks , IWCMC, 2010, Caen, France.
[19]WenbinZhang ,Xiaozong Yang and Shaochuan Wu , “A new improved MAC scheme: RM-MAC”, 6th International ICST Conference on communications and networking in China (CHINACOM), Aug 2011.
[20]N. Agarwal, D. ChanneGowda, L. Kannan, M. Tacca, and A. Fumagalli, “IEEE 802.11b cooperative protocols: A performance study,” in Proc. networking, vol. 4479, LNCS, 2007, pp. 415–426.
[21]Sayed, S., “RID Relay with integrated data for multi-rate wireless cooperative networks”. 5th international conference on Broadband Communications, Networks and Systems, BROADNETS 2008.
[22]Chang-Yeong Oh and Tae-Jin Lee “MAC protocol using cooperative active relays in multi-rate wireless LANs”, IFIP International Conference on wireless and optical communications networks, 2009.
[23]Kaleshi, D. and Zhong Fan, “CORELA: A cooperative relaying enhanced link adaptation algorithm for IEEE 802.11 WLANs” 8th International symposium on wireless communication systems, 2011.
[24]Murad Khalid, Yufeng Wang, In ho Ra and Ravi Shankar, “Two relay based co-operative MAC protocol for wireless ad-hoc network”. IEEE Transactions on vehicular technology Vol 60, No. 7 September 2011.
[25]L. Buttyan and J.P. Hubaux, “Enforcing service availability in mobile ad-hoc WANs”, Proc. of Workshop on Mobile Ad-hoc networking and Computing (MobiHOC), Boston, USA, August 2000.
[26]Zhong, S., “Sprite: A simple, cheat-Proof, credit-based system for mobile ad-hoc networks”. Proceedings of IEEE Infocom. San Francisco, CA, USA, 2003.
[27]P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”. Communication and Multimedia Security Conference September 2002.
[28]Vikram Srinivasan, Carla Fabiana and PawanMuggehalli, “An analytical approach to the study of co-operation in wireless ad-hoc network”, IEEE Transactions on wireless communications Vol 4, No. 2 March 2005.
[29]Tingting Chen, Fan Wu, and Sheng Zhong, “FITS: A finite-time reputation system for cooperation in wireless ad-hoc networks”. IEEE Transactions on computers. , vol. 60, no. 7, July 2011.
[30]Piyush Kumar Shukla, Sarita Singh Bhadauria, Sanjay Silakari “ARA-MAC: A Qualifying Approach to improving Attack Resiliency and Adaptability in Medium Access Control Protocol for WLAN 802.11,” International Journal of Computer Applications (0975 – 8887) Volume 49– No. 19 , pp.01—10, 2012.
[31]Nidhi Newalkar, Sanjay Silakari and Piyush Kumar Shukla, “Comparative Analysis of Co-operative MAC Schemes,” ISCOS, International Symposium on Cloud and Services Computing, IEEE, Conference, pp. 42-48, 2012.
[32]Saman Atapattu, Yindi Jing, Hai Jiang, “Relay Selection Schemes and Performance Analysis Approximations for Two-Way Networks”, IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, PP. 987-998, March, 2013.
[33]Bin Cao, Gang Feng, Yun Li, and Chonggang Wang, “Cooperative Media Access Control With Optimal Relay Selection in Error-Prone Wireless Networks”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 1, pp. 252-265, Jan. 2014.
[34]Xiaoyan Wang, Jie Li and Feilong Tang, “Network Coding Aware Cooperative MAC Protocol for Wireless Ad.-Hoc Networks,” IEEE Transactions on Parallel & Distributed System, Vol. 25, No. 1, pp. 167-179, January, 2014