Thursday 25th of April 2024
 

Design and Modeling of Hidden Nodes WLAN and MAC Layer Protocol Simulated By NS-2


Tazeem Ahmad Khan and Mirza Tariq Beg

In wireless network, we are facing a problem to transmitting simultaneously to same receiving node. So that performance of network not same as normal network (may be Central control or ad-hoc network). Normally such type problem solves MAC layer protocol using RTS/CTS, but not only RTS/CTS, also need appropriate protocols parameter. In this paper, Design modeling hidden nodes WLAN Network and optimized the performance of network. Performance analysis depends upon packet delivery ratio, received packets, loss packets, data rate and end to end delay. Network Simulation is under the basic scheme MAC Layer protocol (DCF). The effect of RTS/CTS, packet length, receiver sensitivity, capture sensitivity and Control Rate are analysis. Here we use NS-2 simulator for model of hidden nodes wireless network and analyze the performance.

Keywords: MAC layer, hidden nodes, Ready-to-send (RTS)/Clear-to-send (CTS)

Download Full-Text


ABOUT THE AUTHORS

Tazeem Ahmad Khan
Research Scholar, Department of Electronics and Communication, Jamia Millia Isamia

Mirza Tariq Beg
Department of Electronics and Communication, Jamia Millia Isamia, New Delhi-110025 ,India


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »