Page 1

Scientific Journal of Impact Factor (SJIF): 4.72

e-ISSN (O): 2348-4470 p-ISSN (P): 2348-6406

International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017

An Efficient Performance analysis of IEEE 802.11 in Multi-Hop Wireless Local Area Network V.Manoj Kumar Asst. Prof., Dept. of CSE, Malla Reddy Institute of Technology & Science, Hyderabad. Abstract: We propose a multi-hop Wireless LAN engineering what's more, exhibit its advantages to wireless customers. For this engineering, we characterize execution ways that permit inter operation with existing wireless LANs which can prompt an incremental arrangement of this framework. We measure the execution benefits of the proposed plots through estimations in practical wireless LAN situations. We likewise look at the execution of such multi-hopwireless LANs through point by point recreation thinks about. Our outcomes demonstrate that these multi-jump expansions can essentially enhance the wireless access understanding (in wording of information throughput, inertness, and so forth) for customers who empower such components. All the more strangely, when multi-hop augmentations areempowered by a portion of the customers, it likewise emphatically impacts theexecution at different customers that are totally unconscious of theseaugmentations. Index Terms: Wireless LAN, Multi-Hop WLAN, Multi-hop 802.11, Data throughput 1. Introduction IEEE 802.11 based wireless LANs (WLANs) are one of the essential empowering agents of untethered access to the Internet. In this paper we characterize a multi-hop 802.11-based WLAN design, show how such a framework can give critical execution benefits over existing single hop partners, and depict a sending way that will empower it to consistently interoperate with existing WLAN foundations. There are various advantages of empowering a multi-jump choice for wireless access to the Internet. A conspicuous favourable position of such engineering is the expansion in the wireless scope territory. In this paper we demonstrate that even from an information execution perspective there are noteworthy advantages in sending a wireless multi-jump design as an entrance component to the Web. For instance, our estimations in conveyed WLANs show that much of the time multi-hop expansions can move forward the information throughputs by a factor of at least two. One approach to build this multi-jump get to framework is to utilize a directing layer based arrangement. Truth be told, a number of on-request directing conventions have been characterized to give organize level availability between discretionary sets of wireless hubs in a specially appointed wireless system. While these conventions can be utilized to build fitting multi-jump ways from the wireless customers to the Access Points (APs) of a 802.11 WLAN, in this paper we contend that the advantages of multihop ways can be better acknowledged by actualizing them in the wireless medium access layer.

Fig 1 - The multi-hop 802.11 architecture. The circles represent the communication range for the specific APs. A. Multi-hop Wireless LAN and its advantages A typical WLAN comprises of two distinct elements—Access points (APs) and stations (STAs), which we allude to as customers in this paper. A customer partners itself with an AP inside its coordinate correspondence extend. The arrangement of every single such customer for a particular AP is known as the Basic Service Set (BSS) for that AP. A solitary WLAN can comprise of various such BSSs, one relating to each AP. The APs are associated by means of a spine

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 dissemination framework (DS), which additionally gives a channel to the outside system. All the BSSs together with the DS are known as the Extended Service Set (ESS). The whole ESS is recognized by a solitary ESSID. In Figure 1 we delineate our proposed multi-jump 802.11 design. In this engineering, every customer can specifically connect itself with an AP in the WLAN. Also, the customer can likewise have a multi-jump way, by means of different customers acting as middle people or intermediaries, to in a roundabout way connect with the AP. There are various advantages of a multijump wireless LAN design. We examine them thus. Improved execution: Some customers in a WLAN are asset drained. Think about the situation when a particular customer is low on battery control. The vitality required for it to specifically speak with AP2 is restrictively costly. Be that as it may, the accessibility of a close-by customer that can fill in as an intermediary essentially diminishes the vitality necessities for correspondence. Hence the multi-jump way prompts expanded lifetime for C5. Additionally, think about another situation where the immediate channel amongst C5 and AP2 is exceptionally loud. In this manner, information transmitted on this channel will experience noteworthy blunders and misfortunes. Run of the mill executions of the IEEE 802.11 convention responds to such misfortunes by decreasing the information rate. Then again we can utilize the 802.11 convention and keep up the higher information rate by utilizing a higher transmit control. Expanding the transmit control builds the flag to proportion, which in turn lessens the bit mistake rate on the channel and permits the 802.11 convention to work at the higher information rate. This high control arrangement prompts expanded impedance in the WLAN. For instance, transmissions from C5 may now meddle with information transmissions amongst AP0 and its customers, subsequently lessening the information throughput of the WLAN. In a multi-hop framework, C5 can utilize a "superior found" customer (e.g. C3) to convey with the AP. We performed nitty gritty estimations in existing WLANs to contemplate the advantages of a multi-hop way to deal with customers. Our outcomes demonstrate that in numerous such cases customers can use a multi-hop way to essentially enhance their information throughput. Also, the execution change of these "asset drained" customers additionally decidedly impacts the execution of customers in a similar WLAN that are not even mindful of multi-jump augmentations. Broadened wireless scope: In the standard single-jump WLANs, a customer must be situated inside the scope territory of some AP to get wireless administrations. A multi-jump WLAN use taking an interest intermediaries to broaden the scope zone, e.g. customer C0 in Figure 1. Empowering robotized re-association of AP conveyance: The objective of a WLAN fashioner is to guarantee that every area in the zone is unmistakable to no less than one of the APs of the WLAN. WLAN heads right now utilize different systems to screen the normal execution of WLANs. One of the more mainstream techniques is to perform flag quality estimations at different areas of the scope region from the adjacent APs. Such an approach is repetitive and can't be performed much of the time. Accordingly, WLAN executives frequently don't have precise radio maps that mirror the current conditions in the wireless condition. (It is a typical encounter that new furniture brought into a room influences the channel clamor attributes essentially.) The multi-jump WLAN introduces another chance to upgrade the online execution observing as experienced by customers. For instance, when intermediaries in a particular area get vigorously utilized, (e.g. because of poor divert conditions in the directway to the APs) the framework can trigger cautions to the LAN heads to fittingly include or re-disperse the APs in that area. In the proposed multi-jump 802.11 engineering, the intermediaries give such data to the Multi-jump LAN Director (MLM) and the last is in charge of giving such warnings. In a portion of the above illustrations, e.g. broadened wireless scope, the long haul arrangement is to add more APs to the WLAN. In such cases the multi-hop design can be utilized to (1) give a fleeting arrangement (2) handle transient circumstances, e.g. streak swarms (3) give execution benefits in cases where re-association of the WLAN is excessively costly (4) enable overseers to find execution issues in the WLAN which can trigger the long haul re-arrangement based arrangements. In different cases, the multi-hop design gives the main consistent answer for enhance the execution of asset drained gadgets (e.g. a gadget with low leftover battery control). B. Pitfalls While there are various advantages of the multi-hopdesign, it is essential to assess a portion of the potential entanglements that may emerge in this condition. Increased channel contention: When a bundle takes after a multi-hop way to an AP, it utilizes the wireless channel two or more circumstances. This would build the conflict of the channel what's more, possibly permit decreased information throughput for the source and also different customers in the region. Asset utilization at proxies: Packets following multi-hop ways expend assets at the intermediaries, e.g. battery control, data transmission, and so forth. Unmistakably, there is no motivating force for wireless customers to work in such a charitable mode. Each customer in the WLAN can pick autonomous strategies on when it will fill in as an intermediary. For instance, a few clients may volunteer their portable workstation customers when they are fuelled from an electric outlet, and when the portable PCs are sitting out of gear, i.e. not effectively creating system movement. Furthermore, it is conceivable to characterize motivator based parcel sending rules in such multi-hop situations as appeared. Security Threats: Allowing a mediator to forward information bundles in the interest of a customer may conceivably open the WLAN to new security dangers. We contend that arrangement of such multi-hop components does not include any security issues that present single-jump conditions don't as of now have. We talk about this angle in Section VI.

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 C. Incremental Deployment IEEE 802.11 based WLANs are presently generally sent. In this way another multi-hop design that requires a change to existing elements (e.g. customers and APs) isn't generally practical. In this way, we investigate the potential ways of organization of multi-hop WLANs that require different degrees of progress to existing elements. The intermediaries are new substances in the framework and any customer that goes about as an intermediary needs to executes the multihop augmentations. Be that as it may, to keep up in reverse similarity with existing frameworks we consider situations where the other substances, i.e. consistent customers and APs, don't know about multihop augmentations to the WLAN. We consider the four extraordinary cases (1) ignorant AP, uninformed customer, (2) unconscious AP, mindful customer, (3) mindful AP, ignorant customer, and (4) mindful AP, mindful customer — and characterize methods for actualizing a multi-hop 802.11 WLAN for each of these cases. While the essential standards of the conventions in these cases are comparable, the components required to accomplish the coveted impact fluctuate from case to case. The conventions and components for the aware client cases are additionally intriguing, and we principally concentrate on these two cases in this paper. D. Roadmap Whatever is left of this paper is sorted out as takes after. In Section II we give itemized estimation examines on a conveyed (single-hop) WLAN to show the potential advantages of a multi-hop execution. We depict the conventions and instruments to build a multi-jump 802.11 WLAN for the four cases said above. We exhibit comes about because of our reproduction based examinations that examine the execution of the proposed plans. II. Measurement-Based Evaluation We recognized a portion of the potential traps of a multi-hop WLAN engineering. Specifically, we distinguished the issue of expanded channel conflict as a potential hindrance of multi-hop WLANs. In this area we principally look at the channel dispute impacts and their effect on information throughput. Our outcomes demonstrate that a precisely composed multi-hop WLAN convention can prompt critical information execution benefits in all cases. A. Experimental Setup We played out our investigations on the fourth floor of A.V. Williams building (which has the Computer Science Department at the University of Maryland). The guide of the floor is appeared in Figure 2. In the investigations portrayed in this area, we played out the trials concerning a delegate AP running the 802.11b convention and found at the position set apart in the figure. We quantified the information throughput accomplished by customers utilizing both direct and multihop designs. In both these designs, the customer played out a dependable information exchange (utilizing TCP) of 51.12 MB of information to a sink, situated in the same wired subnet as the AP. (This means 100,000 IP bundles of size 536 bytes each, created at the source.) In each test we gauged the information exchange inactivity as saw at the application layer. For the multi-hop estimations, we didn't execute the full form of our proposed convention (to be depicted in Section III). Rather we imitated the multi-hop interface layer instruments utilizing statically allotted IP locations and courses,

Fig. 2. Potential data throughput improvement by using multi-hop extensions to the currently deployed WLAN in the 4th floor of the A.V.Williams building. The ―Good,‖ ―Fair,‖ ―Bad,‖ and ―No Connection‖ marks the performance of the single-hop WLAN. The multi-hop benefits shown in this figure are obtained using two hop paths. In this setup, the intermediary gadget utilized two separate wireless cards — one to connect with the AP also, work in the oversaw mode, and the other to collaborate with the source customer and operation in the impromptu mode. Due to physical requirements of the PCMCIA spaces of portable workstations, we thought that it was advantageous to utilize

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 two portable workstations, associated by 100 Mbps Ethernet, to work as a solitary intermediary as appeared in the figure. Note that such a course of action is really disadvantageous to the multi-hop test. Not at all like multi-jump connect layer systems, the information parcels experience extra deferral due to arrange layer preparing. All the more essentially, this setup too prompts an extra inertness because of information exchange between tablets An and B by means of Ethernet. In these investigations we utilized IBM Thinkpad tablets running Linux with part form 2.4.19, outfitted with Orinoco Silver PC cards. To copy the current condition in the A.V. Williams Building, we casually studied portable workstation utilize propensities for individuals in the diverse rooms on the fourth floor. We found that numerous portable PC clients, while at work, connect to their tablets to an electric electrical plug 1. For multi-hop ways, we just considered these areas to be contender for intermediaries. The IEEE 802.11 standard enables numerous channels to be utilized at the same time. In the multi-hop analyzes there are two wireless connections, one from the source to the intermediary, and the other from the intermediary to the AP. B. Results Measurement study throughout the month of June 2003, in which we observed the data throughput of

Fig. 3. The experimental setup to measure performance of a multi-hop WLAN. As anyone might expect, we found that the wireless information throughput varied between various estimations. In any case, it was anything but difficult to distinguish a predictable requesting among the information throughput accomplished at various areas. In Figure 2 we display an estimated wireless scope what's more, coordinate jump information throughput from various areas to a delegate AP (set apart in the figure). In the territory checked "Great" clients can get information throughput of more than 4 Mbps. (Despite the fact that the greatest information rate in the 802.11b WLAN is 11 Mbps, it isn't conceivable to accomplish a 11 Mbps information rate due to overheads of RTS/CTS/ACK outlines, channel dispute impacts, and so on.) In the zone checked "Reasonable" the throughput fluctuates in the vicinity of 1 and 4 Mbps. In the region checked "Awful" the throughput is under 1 Mbps, lastly the clients lose availability with the AP in the region so checked 2. In Figure 2, the two spotted lines on the left distinguish the districts where the copied multijump wireless ways prompt enhanced execution over the current framework (e.g. > 2 times higher data transfer capacity in the "awful" area). The two channel multi-hop ways are valuable notwithstanding when clients are found inside the great wireless scope district (e.g. area G2). At last we can watch that the multi-jump WLAN impressively expands scope, as appeared in the figure. In Table I we organize a portion of the delegate estimations at chose areas on the floor. Using three hops: We likewise led a few examinations with multi-hop ways with three jump ways. We watched that the data transmission accomplished in these examinations were comparable or possibly more terrible than the two hop estimations (e.g. at area N1 it was 1.7 Mbps for a solitary channel analyse furthermore, 3.79 Mbps when three channels were utilized). In this manner, the extra advantages of utilizing at least three jumps inside the typical coverage areas of APs are marginal. Overall, we believe that these experiments serve as evidence that multi-hop WLANs can be useful to clients in many cases III. Multi-Hop WLAN Architecture and Deployment We define three important Sconstructs necessary to implementa multi-hop WLAN. We call them composition, relaxation, and replacement of proxies (Figure 4). In the examples in the figure we use three or more hops for the multihop paths. The protocol mechanisms generalize to an arbitrary number of hops. However, our measurements indicate that in most typical scenarios, two hop paths are sufficient for performance benefits, and benefits of additional hops are marginal. Let us consider any general metric,M(e.g. bandwidth, loss rate, etc.). Composition defines the protocol mechanisms to add a proxy on the path from the client to the AP (Panel 1 → Panel 0). Such an addition is performed if and only if the path improves with respect to the given metric, M, i.e. in the figure

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406

(We use the operator to denote composition). The definition of ―better than‖ depends on the specific metric. Replacement describes mechanisms where one proxy replaces another (Panel 1 → Panel 2) and leads to an improvement of the path quality with respect to M. In the figure this implies that Note that the proxy Z may be associated with a different AP within the same WLAN. Finally, relaxation defines protocol mechanisms to remove a proxy on the path between the client and the AP (Panel 3→ Panel 4), to improve the path quality. In the figure this requires that

We describe the implementation of the constructs with respect to an example metric — bandwidth available on the path from the client to the AP

Fig. 4. The Composition, Replacement, and Relaxation constructs. C is a client. X, Y, and Z are proxies. Note that there are two key segments that decide the data transfer capacity of a wireless way: (1) commotion on the wireless channel, and (2) conflict with different customers. As the commotion on the channel expands, the 802.11b executions on the wireless cards decrease the information rate, in this manner expanding the way dormancy and decreasing the way transmission capacity. Thus as crashes happen on the wireless channel, the 802.11b customers perform conflict determination which prompts lessening in data transfer capacity and increment in dormancy. There are two points of interest of this proposed heuristic: (1) it requires no dynamic estimation activity and consequently doesnot build the dispute of the information channel, and (2) an endpoint of a wireless connection or any outer substance with the capacity to snoop bundles can utilize this strategy to appraise the measurements for that connection. A. AwareClient We autonomously considers the way from the customer to the AP (forward way) and the way from the AP to the customer (return way). We utilize the accompanying documentation. For any connection, X → Y, mean the data transfer capacity on that connection. For a customer, C, we speak to the conclusion to-end data transfer capacity on its single or multi-jump way to the AP, by bC. Along these lines bC = min{bX,Y } over all X → Y hops on this way. bC is our target of amplification. Forward Path: Let us accept that a customer, C, right now utilizes some forward way (either immediate or multi-hop) to an AP, where the customer is the wellspring of activity. Think about a particular jump on this way, X → Y as appeared in Figure 4. (In the event that the customer is utilizing a solitary hop way, at that point X is C, and Y is AP.) For each such X → Y hop, X processes the transfer speed accessible on that hop, bX,Y , utilizing the strategy exhibited in the reference section. Every hub, Y , on the way, intermittently publicizes its end to- end data transmission to the AP, bY , with a low recurrence (e.g. once at regular intervals). Consequently, X can figure bX as min{bX,Y, bY }. When utilizing a multi-jump way, every customer, C, (or intermediary, X) in the framework intermittently publicizes the estimation of bC (or bX) in its single-hopneighbourhood. This occasional promotion can be done either utilizing neighbourhood communicates of an extra bundle sort at a low recurrence, or piggy-support onto information bundles. Any intermediary in the region snoops this data and utilizations it to decide whether there is a superior multi-jump way through itself. For instance, think about another intermediary, Z, that is inside coordinate correspondence scope of X. Z gets the data transfer capacity ad, bX, on this way. X has a superior way to an AP through Z instead of its current way, if

The intermediary state is delicate. In this way, without information bundles, X is required to intermittently revive the state at Y by sending unwarranted Forward Proxy Accept messages. Y can disavow intermediary administrations to its past hop, X, by utilizing a Forward Proxy Revoke message. This can be summoned due to many reasons. For instance, the tablet filling in as the intermediary is unplugged from the electric outlet and, thus, is never again ready to fill in as an intermediary. On the other hand it can likewise be that the intermediary is separated from its AP. As a last fallback component, X can likewise distinguish the disappointment of Y, when it neglects to recognize a limit number of continuous RTS parcels sent to it.

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406

Fig. 5. Relaxation of the last proxy on a multi-hop path. B. Unaware client: We now portray the usage way for a multi-jump WLAN for the ignorant customer situations. In these situations since the customers are ignorant of multi-jump augmentations, they won't connect with any substance other than APs with the assigned ESSID. On the off chance that very single conceivable intermediary go about as APs, at that point the quantity of APs in the framework can turn out to be vast. In this manner, dissimilar to existing executions of WDS, the intermediaries in our proposed framework imitates AP usefulness on-request, i.e. just when it is required by asset drained customers. Consider a customer C that is specifically connected with a real AP (which we call wired AP in this portrayal). An intermediary, X, imitates AP usefulness when it distinguishes that the way C → X → AP has a higher data transfer capacity than the immediate way C → AP. As in the mindful customer situations, X keeps up the gauge of data transmission from itself to its wired AP (i.e. bX), and processes the immediate data transmission from C to itself (i.e. bC,X). X likewise gauges the immediate transfer speed from C to AP (i.e. bC) by snooping the wireless movement sent by C to the AP. Give us initial a chance to consider the Composition operation in the unconscious AP, uninformed customer case. Low connection quality between the customer and AP is regularly because of two reasons: (1) poor channel conditions, i.e. high commotion in the wireless medium on the way from C to AP, or (2) high system activity which leads to noteworthy channel conflict. 802.11b customers react to both these situations by endeavoring to distinguish a "superior" AP and partner it. In the event that C endeavours such a re-affiliation and sends a test message, the intermediary P (working as an AP) will get the test message and respond to it. Obviously, in this uninformed customer situation, it is conceivable that the customer chooses an imperfect intermediary since it might consider the nature of the prompt connect to the intermediary, not the nature of the composite way.

In the ignorant customer situations, the Relaxation step is too difficult to ensure. For the mindful AP, ignorant customer case, we depend on the AP to start the unwinding step (RAP). Whenever the AP identifies that the immediate way has preferable data transmission over the made multi-jump way, it sends a Client Dissociate Request to the intermediary, X, which has been copying AP usefulness. The intermediaries X along these lines separates the customer, C, and C in the long run re-relates straightforwardly with the wired AP. In the uninformed AP, ignorant customer case, unwinding is conceivable as it were on the off chance that the channel conditions on the way between the customer and the intermediary turns out to be awful, and the customer naturally endeavours to find a superior AP for itself. Along these lines, to compel the customer to find better interchange and conceivably coordinate ways, the intermediary ought to intermittently separate the customer, constraining the last to find a superior AP. This is the main conceivable instrument that can empower way unwinding when both a customer and an AP are unconscious. IV. Simulation Studies A. Simulated Environment –In our trials, we utilized ftp movement to display dependable TCP-based information exchange amongst sources and goals. These information sources were normally versatile customers that sent movement through APs to a wired sink hub. Since our investigation cantered on the information execution of the WLAN, we expected that the interface between the AP and the wired sink isn't a data transfer capacity bottleneck. Regular recreation lengths were between 300 to 600 seconds we show a concise outline of results for the two channel tests. B. Multi-hop extension: single sender case –In the primary investigation, a ftp sender is set at C We consider two portability cases for an intermediary competent customer: (1) it is at first co-situated with the AP, and moves towards C (westward), beginning at time 25 seconds, at the speed of 1 m/s. It achieves C at 275 seconds. (2) It is at first at P, and moves towards S (southbound) with a similar speed. Both these situations catch how the area of an intermediary influences data transmission execution at the customer. The accomplished data transfer capacity

@IJAERD-2017, All rights Reserved


International Journal of Advance Engineering and Research Development (IJAERD) Volume 4, Issue 12, December-2017, e-ISSN: 2348 - 4470, print-ISSN: 2348-6406 found the middle value of over 20 second interims for these two cases, and contrasts it and the no multi-hop situation. V. Conclusion In this paper we have characterized a multi-jump WLAN engineering furthermore, measured its advantages. We additionally characterize organization ways for these multi-jump expansions that can interoperate with existing conveyed WLANs. Through nitty gritty estimations Furthermore, recreation contemplates we demonstrate that the proposed instruments advantage all WLAN clients: those that utilization the proposed multi-hopexpansions, and in addition the individuals who don't embrace these augmentations. While multi-jump WLANs have huge advantages, empowering multi-jump ways from customers to APs including untrusted intermediaries can prompt potential security dangers, e.g. a pernicious intermediary mount a refusal of administration assault by dropping all casings sent to it by the customer salter touchy information sent through it. In any case, we trust that multi-jump expansions try not to include any new risk that isn't as of now exhibit in WLAN conditions. For instance, in current WLANs it is moderately simple to mount a disavowal of administration assault by utilizing basic channel sticking methods. Likewise, all touchy information ought to be encoded utilizing end-to-end components even in existing WLANs, since the whole system between the endpoints ought to be thought to be untrusted for such applications. References [01] H. Wu, C. Qiao, S. De, and O. Tonguz. Integrated cellular and ad hoc relaying systems: iCAR. IEEE JSAC, Vol.19, Iss.10, Oct. 2001. [02] B. Sadeghi, V. Kanodia, A. Sabharwal, and E. Knightly. Opportunistic media access for multirate ad hoc networks. In Proceedings of ACM Mobicom, 2002. [03] N. B. Salem, L. Buttyn, J.-P. Hubaux, and M. Jakobsson. A charging andrewarding scheme for packet forwarding in multi-hop cellular networks.In Proceedings of the 4th ACM MobiHoc, pages 13–24. ACM Press,2003. [04] C. Perkins and E. Belding-Royer. Ad hoc on-demand distance vector(AODV) routing. In IEEE Workshop on Mobile Computing Systems and Applications, Feb. 1999. [05] V. Park and M. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In IEEE Infocom, Apr. 1997. [06] W. D. L. Matthew J. Miller and N. H. Vaidya. A hybrid networkimplementation to extend infrastructure reach. UIUC Technical Report, Jan. 2003.. [07] H. Luo, R. Ramjee, P. Sinha, L. E. Li, and S. Lu. UCAN: a unifiedcellular and ad-hoc network architecture. In Proceedings of the 9thMobicom, pages 353–367. ACM Press, 2003. [08] B. Liu, Z. Liu, and D. Towsley. On the capacity of hybrid wirelessnetworks. In IEEE Infocom, Apr. 2003. [09] Y.-D. Lin and Y.-C. Hsu. Multihop cellular: A new architecture for wireless communications. In IEEE Infocom, Mar. 2000. [10] A. Kamerman and L. Monteban. WaveLAN-II: A high performancewireless LAN for the unlicensed band. Bell Labs Technical Journal, 1997. [11] D. Johnson and M. D. Dynamic Source Routing in Ad Hoc Wireless Networks. Kluwer Academic Publishers, 2001. [12] O. Dousse, P. Thiran, and M. Hasler. Connectivity in ad-hoc and hybridnetworks. In IEEE Infocom, June 2002. [13] Z. J. Haas and M. R. Pearlman. The performance of query control schemes for the zone routing protocol. In Proceedings of the ACMSIGCOMM ’98, pages 167–177. ACM Press, 1998. [14] J. Gomez-Castellanos, A. T. Campbell, M. Naghshineh, and C. Bisdikian.PARO: Supporting transmission power control for routing inwireless ad hoc networks. ACM/Baltzer Journal on Mobile Networks, 2002. ABOUT AUTHORS: V.MANOJ KUMAR is currently working as an Assistant Professor in Computer Science and Engineering Department, Malla Reddy Institute of Technology and Science, Hyderabad, Telangana. He received his M.Tech in Computer Science in 2011 from SICET, Hyderabad. He has guided many engineering graduates.

@IJAERD-2017, All rights Reserved


An efficient performance analysis of ieee 802 11 in multi hop wireless local area network ijaerdv04i  
An efficient performance analysis of ieee 802 11 in multi hop wireless local area network ijaerdv04i