Modified Distributed Laxity Based Priority Scheduling Scheme

RamMurthy, G.; Naveen Reddy, G.; Ravi Shankar Varma, A.
June 2011
Wireless Personal Communications;Jun2011, Vol. 58 Issue 3, p627
Academic Journal
This paper proposes a medium access control (MAC) protocol for mobile Adhoc networks (MANET). The MAC layer is responsible for selecting the next packet to be transmitted and the timing of its transmission. Various new factors are introduced to determine the priority of the flow. The back-off mechanism devised by us grants node access to the channel based on the rank of its highest priority packets. It is clear that the proposed algorithm works better than the existing distributed laxity based priority-scheduling scheme and the same is proven using the simulation results using Glomosim.


Related Articles

  • Target Detection System (TDS) for Enhancing Security in Ad hoc Network. Kanyal, Hoshiyar Singh; Rahamatkar, S.; Sharma, B. K.; Sharma, Bhasker // International Journal of Distributed & Parallel Systems;Sep2013, Vol. 4 Issue 5, p15 

    The idea of an ad hoc network is a new pattern that allows mobile hosts (nodes) to converse without relying on a predefined communications to keep the network connected. Most nodes are implicit to be mobile and communication is implicit to be wireless. Ad-hoc networks are collaborative in the...

  • PERFORMANCE ANALYSIS OF MANET BEFORE AND AFTER BLACK HOLE ATTACK. Bhalla, Heena // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 1, p273 

    A Mobile ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes....

  • CDMA BASED SECURE CROSS LAYER FRAMEWORK FOR AUTHENTICATION AND SCHEDULING IN MANET. DANIEL ROSARIO, B. BERIL; RAJARAM, A. // Journal of Theoretical & Applied Information Technology;11/30/2014, Vol. 69 Issue 3, p452 

    In MANET, mobile nodes are connected without any centralized administration. Due to that, a mobile node is easily affected by means of several attacks. Due to these attacks, network is totally partitioned and more packet congestion occurs. Because of improper scheduling, congestion level of...

  • FUZZY-BASED ROUTING SCHEME IN MOBILE AD HOC NETWORKS. JIN-LONG WANG // Intelligent Automation & Soft Computing;2012, Vol. 18 Issue 3, p297 

    In mobile ad hoc networks, mobile nodes have to communicate to each other without any infrastructure or base station. Thus, a lot of critical routing decision factors should be taken into considerations, such as reputation, reliability, availability, security, and mobility. Specially, the...

  • Path Stability Mechanism in Mobility based AOMDV for MANETS. Savane, Vishesh D.; Kasabegoudar, Veeresh G. // International Journal of Computer Applications;Aug2013, Vol. 76 Issue 1-16, p43 

    Mobile Ad hoc Networks (MANETs) are used for providing Quality of Service (QoS) where nodes are having mobility and can travel in any random direction. There are several reactive protocols (DSDV, AODV, EBAODV, etc.) available in literatures which are suitable for MANETs based on single and...

  • Performance Improvement by Dynamic Queue Management in Mobile Ad hoc Network. Yadav, Kajal; Shrivastava, Gaurav // International Journal of Computer Applications;Jun2013, Vol. 72 Issue 1-23, p14 

    Mobile Ad hoc network [MANET] consists of mobile nodes without any fixed infrastructure, communicating through wireless medium. In MANET, Congestion occurs in any intermediate nodes when data packets travel from source to destination and they incur higher packet loss rate and long delay, which...

  • Efficient Channel Management Mechanism to Enhance Channel Utilization for Sensing Data Delivery in Vehicular Ad Hoc Networks. Tsogoo, Buyandelger; Yoo, Sang-Jo // International Journal of Distributed Sensor Networks;8/26/2015, Vol. 2015, p1 

    IEEE 1609.4 defines MAC layer implementation in a vehicular ad hoc network (VANET). In IEEE 1609.4 multichannel operation, the control channel interval (CCHI) and the service channel interval (SCHI) are defined such that service channels cannot be utilized during the CCHI, and vice versa, which...

  • An enhanced Scheme for Reducing Vertical handover latency. Faisal, Mohammad; Khan, Muhammad Nawaz // International Journal of Advanced Computer Science & Application;Jan2012, Vol. 3 Issue 1, p100 

    Abstract- Authentication in vertical Hand over is a demanding research problem. Countless methods are commenced but all of them have insufficiencies in term of latency and packet loss. Standard handover schemes (MIPv4, MIPv6, FMIPv6, and HMIPv6) also practice these shortages when a quick...

  • Efficient Content Authentication in Ad-Hoc Networks-Mitigating DDoS Attacks. Joshi, Anuj; Agrawal, Krishna Kant; Arora, Deepak; Shukla, Shashwat // International Journal of Computer Applications;Jun2011, Vol. 23, p35 

    With the emergence of mobile ad hoc networks it is now possible to access network accessing and communicate data in an area where no fixed infrastructure exists or existing infrastructure is not available. Since in ad hoc networks, the exact copies of the same content are stored at various...


Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics