Design of Algorithm to perform Reliable Packet Delivery
Alka1, Rahul Yadav2
Student, PDM College1
Bahadurgah Haryana
alkaashandilya@gmail.com
Astt. Prof., PDM College2
Bahadurgah, Haryana
RahulYadav.project@gmail.com
?
Abstract-- A Wireless network is a dynamic network with large no.of nodes. As the traffic increases over the network such type of network suffers from the problems like congestion and packet loss. But in case of P2P network there is one more problem regarding the life of the network. A network can be affected from some intruder or some broken link over the network As a result some loss of information occur over the communication. The packet loss is acceptable upto some threshold value but as there is more packet
…show more content…
Designing a foolproof security for ad hoc network is a challenging task due to its unique characteristics such as, lack of central authority, frequent topology changes, rapid node mobility, shared radio channel and limited availability of resources
The wireless networks use air through the operation of a communications protocol. For synchronization, wireless networks employ a carrier sense protocol similar to the common Ethernet standard. This protocol enables a group of wireless computers to share the same frequency and space.
While the term wireless network may technically be used to refer to any type of network that is wireless, the term is most commonly used to refer to a telecommunications network whose interconnections between nodes is implemented without the use of wires, such as a computer network (which is a type of communications network).
The Institute for Electrical and Electronic Engineers (IEEE) has been involved in the development of wireless LAN standards for the last seven years. Finally IEEE has evolved with a version of standard to be used for wireless networks named as IEEE 802.11 in 1997.
Wireless networks refer to those networks that make use of radio waves or microwaves in order to establish communication between the devices.
Fig1: wireless network [2]
A. Issues and Challenges
Designing a foolproof security protocol for ad hoc routing is a very challenging task due its unique
3. What is an ad hoc network? In this network, the wireless clients (stations) communicate directly with each
802.11 WLANs use CSMA/CA, the devices use a four-way handshake to gain access to the airwaves to ensure collision avoidance, and also to know about hidden nodes from different wireless standard.
A wireless network could be useful in many places like a home or business/workplace to be able to share a variety of files such as printers and scanners.
Although to answer their many questions and concerns, IEEE expanded even further and created 802.11g. Having 802.11g was like having the best of both worlds with and achievable speed of 12 to 25Mbps, top speed of 54Mbps, 2.4 GHz frequency band and the production cost was low what could top that one would have to ask. The disadvantage is that it cost more than the 802.11b, to include the change in modulation created the same congested problems as that of 802.11b. The advantage is that it was compatible with both 802.11a and 802.11b, which made previous compatibility issues null and void. Similar to 802.11a, 802.11g transmit faster because it uses OFDM instead of CCK
A WLAN is a network that helps to attach two or more devices using wireless techniques like spread spectrum. It access in limited area like schools, colleges, organizations, offices, and computers labs etc. This helps the clients to access even while roaming near about that area and still they remain connected with network.
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.
Wireless is a technology that transmits signal without using cables as the medium to communicate from one end to other(s) end. Communications via wireless can be anything from radio broadcasting, SOS signal from a ship at sea, or day-to-day Wi-Fi that we use to connect to the Internet. Actually wireless technology is a technology that already been in development for quite a long time, it developments already begun since late 19th century. Here is the timeline of the development of wireless technology:
Whether it’s because you have made a call using a mobile phone, received a message on your pager, checked your email from a PDA or even just seen an advert related to it, we have all come across a wireless data or voice network! If a user, application or company wishes to make data portable, mobile and accessible then wireless networking is the answer. A wireless networking system would rid of the downtime you would normally have in a wired network due to cable problems. It would also save time and money due to the fact that you would spare the expense of installing a lot of cables. Also, if a
Wireless Sensor Network is a new technology consists of related distributed sensors to monitor physical or environmental condition. A basic wireless sensor network is shown in fig 1.1. A wireless sensor network (WSN) has many small sensor nodes deployed in large numbers to sense the physical world. WSN have many applications such as military and civilian usage.
Wireless local area networks (WLANs) are quickly evolving in computer communication networks (Yue & Matsumoto, 2002). They are being developed to deliver users in restricted geographical areas the ability to use a high bandwidth. WLANs are used in wireless offices, businesses, college campuses, and other areas (Yue & Matsumoto, 2002). The use of wireless network interfaces allows mobile devices to connect to the internet using the Ethernet. Numerous contention-based protocols that could be modified for use in wireless local area networks exist (Yue & Matsumoto, 2002). The current standard protocol being observed by IEEE802.11, a standard for WLANs, consist of protocols based on the carrier sense multiple access, better known as CSMA (Yue
A wireless LAN or WLAN is a wireless local area network, which is the linking of two or more computers without using wires. It is the same as LAN, but has a wireless interface. WLAN utilizes spread-spectrum technology based on radio waves to enable communication between devices in a limited area, also known as the basic service set. This gives users the mobility to move around within a broad coverage area and still be connected to the network.
Information and communication technologies have become advanced and efficient in last few decades. The improvement is radical and it has made the broadband technologies and internet more robust and wide spread. Internet has become an integral part of any communication technology. It carries various type of information and offers different type of network services. The speed of data transmission has also improved. [1]Now days, Internet can be accessed from any smart phone, PDA, laptop, computer and several other smart devices. Wireless internet connection through wireless LANs at public places like airports, stations etc. All these have led to the wireless mesh network. [2]
In the field of telecommunications wireless communication is the most advanced and widely used method for long distance communication. Wireless Communication today faces various
Wi-Fi - a trademark of Wi-Fi Alliance for wireless networks based on the standard IEEE 802.11. The acronym Wi-Fi (from the Wireless Fidelity, which can be literally translated as "the quality of the wireless") is currently developing as a family of standards for the transmission of digital data radio streams. It is still often hears that the wireless network is not secure compared to wired solutions. At the present stage of Wi-Fi technology‘s development that is not true. Simply security needs to be addressed (to design and maintain), as in the case of a wired network.
Several approaches of game theory that helps in improving the routing protocols such as ADOV is explained by Mohammad M. Javidia and Laya Aliahmadipoura [38]. The Game theory topics such as forwarding dilemma game (FDG) which is implemented based on Prisoner’s Dilemma game is used here to improve the ADOV protocol.