The Research and Improvement of BEB Algorithm in Wireless Ad Hoc Network

Article Preview

Abstract:

This paper analyses the hidden terminal and exposed terminal problems on MAC layer which increase the probability of data collision and decrease seriously the performance of TCP based on discussing the problem that TCP faces in Ad Hoc network. Through studying the deficiency of the BEB algorithm, this paper proposes an improved BEB algorithm that called AS-BEB. The AS-BEB algorithms can adjust the size of CW based on the current network status. Comparing with the BEB algorithm, the AS-BEB can improve the performance of the TCP applying in Ad Hoc Network.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 271-273)

Pages:

1035-1040

Citation:

Online since:

July 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Gast. 802. 11 Wireless Networks: The Definitive Guide. 2002: 39-73.

Google Scholar

[2] LUO Wan Ming, LIN Chuang, YAN Bao Ping. A Survey of Congestion Control in the Internet. Chinese Journal of Computers. 2001, 24(1): 1-18.

Google Scholar

[3] Fu Z, Meng X, Lu S. How bad TCP can perform in mobile Ad Hoc networks. Proc. of the 7th Int'l Symp. On Computers and Communications. Taormina: IEEE Computer Society Press, 2002: 298-303.

DOI: 10.1109/iscc.2002.1021693

Google Scholar

[4] IEEE 802. 11b Wireless LAN Medium Acess Control (MAC) and Physical Layer (PHY) Specifications. http: /standards. ieee. org/getieee802/802. 11. html.

DOI: 10.1109/ieeestd.1997.85951

Google Scholar

[5] G Bianchi. Performance analysis of IEEE 820. 11 distributed coordination function[J]. IEEE Journal on Selected Area in Communication, 2000, 18(3): 535-574.

Google Scholar

[6] Gannoune L. A non-linear dynamic tuning of the minimum contention window (CWmin) for enhanced service differentiation in IEEE 802. 11 ad-hoc networks. Proc of Vehicular Technology Conference. May 2006: 1266 - 1271.

DOI: 10.1109/vetecs.2006.1683038

Google Scholar

[7] S. Xu and T. Saadawi, Does the IEEE 802. 11 MAC protocol work well in multihop wireless Ad hoc networks? IEEE Communications Magazine, June 2001, 39(6): 130-137.

DOI: 10.1109/35.925681

Google Scholar

[8] T. S. Rappaport, Wireless Communications: Principles and Practice, Second Edition. (2002).

Google Scholar

[9] SUN Qiang.The application of piggybacking technique in Ad hoc WLAN[J].2005 Asia-Pacific Conference on Communications,2005, 3(5): 574-577.

DOI: 10.1109/apcc.2005.1554126

Google Scholar

[10] D. Kliazovich F. Granelli, Cross-layer congestion control in Ad Hoc wireless networks[J], Ad Hoc Networks, 2006, 4(6): 687-708.

DOI: 10.1016/j.adhoc.2005.08.001

Google Scholar

[11] K. Tang, M. Gerla. Fair sharing of MAC under TCP in wireless Ad Hoc networks. Proceedings of IEEE Multiclass Mobility and Teletrac for Wireless Communications Workshop (MMT99). Venice, Italy, Oct. 1999. New York: IEEE Press. 1999: 1-10.

DOI: 10.1007/978-1-4757-5920-4_24

Google Scholar

[12] T. S. Rappaport. Wireless Communications: Principles and Practice, IEEE Press: Prentic Hall PTR. Second Edition. (2002).

Google Scholar