Font Size: a A A

A New Ad Hoc Multi-channel Access Protocol Design And Simulation

Posted on:2009-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:K BaiFull Text:PDF
GTID:2208360245461135Subject:Access to information and detection technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information and network technology, various networks have appeared in our daily life. Ubiquitous network have a great influence in politics, economy and culture of the world. Wireless network is the kind of network that the medium of communication is the wireless medium such as electromagnetic wave. In generally speaking, there are two kind of wireless network. One is the wireless network with the center node and infrastructure. Another one is the wireless network with no center node and every node is equal, which is called Ad Hoc wireless network.Ad Hoc is the network with self organization in multi-hop envionment. Every node is a router which is equal to each other.It has been applied in military affairs and public services due to robustness and anti-destruction. Ad Hoc network is multi-hop network with the hidden and exposed terminal problems, which will affect the performance of the network. So it is very important to research the medium access control protocol.In this paper, it is first introduced the origin and characteristics of ad hoc network, as well as the topology, the application areas and the research trend. Then this paper focuses on the MAC (medium access control) protocol. With the previous work on MAC protocol, the principle and characteristics of protocol have been introduced from different channels, such as single channel, dual channel, and multi-channel, as well as how to solve the hidden and exposed terminal problems to improve the performance of the network. This protocol is creatively introducing the control datagram.According to the requirements of project, this paper introduces a new multi channel MAC protocol from principle, the design pattern, and the work flow of the sending and receiving of node. Theoretical analysis of the protocol, as well as the judgment and improvement, has been given. To verify the protocol, the simulation of the protocol on OPNET has been done to do the performance comparison of the two modes of protocol, and comparison between the new protocol and DCF protocol.
Keywords/Search Tags:Ad Hoc, MAC, exposed terminal, hidden terminal, OPNET
PDF Full Text Request
Related items