Quality of service aware mac based on ieee 802.11 for multihop ad-hoc networks - wireless communications and networking conference, 2004. wcnc. 2004 ieee
Quality of Service Aware MAC Based on IEEE 
802.11 for Multihop Ad-Hoc Networks 
Center for Communication Systems Research 
Center for Communication Systems Research 
University of Surrey, Guildford GU2 7XH 
University of Surrey, Guildford GU2 7XH 
G.Pavlou @eim.surrey.ac.uk 
Abstract—Real-time multimedia applications necessitate collisions, unbounded delay, and increased jitter. The time 
predictable network resources. Quality of Service (QoS) support 
required to resolve collisions is a function of the network load. 
for such applications in mobile ad hoc networks (MANETs) 
In addition, the DCF makes extensive use of control packets as 
requires acceptable channel conditions, QoS-aware mechanisms 
a handshaking mechanism in order to minimize hidden-node 
for channel access, identification of proper forwarding (transit) 
and exposed-terminal problems [2]. This approach is not 
nodes, as well as measures for congestion prevention and 
desirable, especially for periodic time-sensitive traffic, as it not 
management in those nodes. This paper proposes a new QoS-
only increases the collision rate, but also deteriorates the 
aware medium access control (MAC) protocol that takes the 
overall efficiency of the channel and the system [7][8][9]. 
above requirements into consideration. This novel protocol is 
based on the legacy IEEE 802.11, and thus can be easily 
Besides the DCF, the IEEE 802.11 also incorporates an 
integrated into existing systems without much difficulty. alternative access method known as the point coordination 
Simulation results confirm that our approach results in improved 
function (PCF) [4][5][6]. This access method is similar to a 
throughput for real-time periodic traffic, while providing 
polling system, and uses a point coordinator (PC) to determine 
deterministic delay performance. 
which station has the right to transmit. The PCF falls under 
demand assignment access schemes, and as such it is more 
Keywords – Ad hoc Networks, Multiple Access Control, QoS-
suitable for an environment that requires QoS guarantees [16]. 
aware MAC, IEEE 802.11. 
The PCF operation, however, needs a centralized node such as 
an access point (AP), and hence is normally used in WLAN 
environments. In our approach, spread spectrum techniques 
Given that real-time applications will be used in ad hoc 
and collision avoidance multiple access protocols are combined 
networks, efforts for QoS support are under way. However, in 
to form a new MAC protocol for multimedia traffic over 
order to facilitate QoS support, a clear understanding of the 
MANETs [2][10]. This protocol is based on a hierarchical 
difficulties and issues in provisioning QoS in MANETs is 
approach consisting of two sub layers. The lower sub-layer of 
necessary. Since ad hoc networks lack fixed infrastructure, 
the protocol provides a fundamental access method using the 
there is no dedicated agency to manage the channel resources 
DCF to support asynchronous data traffic, and to enable time-
for the network nodes. Quality of service is possible only if 
sensitive traffic to reserve bandwidth using a two-way 
supported by the underlying medium access technology. In 
handshake mechanism. The upper sub-layer is designed to 
other words, the network-level QoS mechanisms cannot work 
support real-time periodic traffic. Our novel smart MAC, 
in MANETs, unless the MAC ensures orderly access to the 
which thus consists of both random (contention-based) and 
shared wireless medium, playing a crucial role in the efficient 
regulated (contention-free) access to the medium, provides 
and fair sharing of the scarce wireless bandwidth [1]. The 
applications with enough resources in order to improve QoS. 
nature of the wireless channel requires that different layers, in 
The rest of the paper is organized as follows. Section II 
particular the network-layer and MAC sub-layer, interact 
reviews IEEE 802.11 and related work on MAC-level QoS, 
constantly in order to provide an overall QoS. Also, there must 
and presents our motivation. The proposed MAC protocol is 
be mechanisms available to minimize or recover efficiently 
described in section III. Section IV presents the evaluation of 
from packet collisions. However, most of the network-layer 
the proposed scheme through simulation, and demonstrates that 
QoS work is tailored to the distributed coordination function 
our MAC approach leads to improved-QoS performances. 
(DCF) of IEEE 802.11a/b as the underlying MAC [11]. In the 
Section V presents our conclusion and future work. 
legacy IEEE 802.11, an ad hoc network is named Independent 
Basic Service Set (IBSS) [6]. An IBSS is based on the DCF 
that utilizes a random access method of carrier sense multiple 
II. PREVIOUS WORK AND OUR MOTIVATION 
access with collision avoidance (CSMA-CA). Since the latter is 
Given that our approach is based on IEEE 802.11, a basic 
mainly meant for best-effort traffic, the present DCF-based 
description of its working mechanism is necessary here. Since 
MANET cannot support QoS at MAC-level, and subsequently 
the main focus of our work on the MAC sublayer is on PCF, 
overall end-to-end QoS guarantees [3][7][8][9]. The contention 
we review the IEEE 802.11with an emphasis on the PC mode. 
from multiple users to access the common medium using a 
random access technique often results in unavoidable packet 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
A. IEEE 802.11 
mind. MAC protocols can be classified based on the mode of 
operation into random access, guaranteed access, and hybrid 
access protocols [16]. Random access schemes are typically 
used for data traffic, and cannot support QoS. Guaranteed and 
hybrid access schemes normally require central nodes. Most of 
the works on QoS-enabled MAC have been based on 
guaranteed and hybrid access schemes, hence targeting 
infrastructure-based networks such as WLANs. 
Figure 1. Timing Diagram for IEEE 802.11 MAC Operation. 
A multiple access scheme based on Time Division 
The DCF mode is the fundamental access method of the 
Duplexing (TDD) for single hop MANET is proposed in [7]. In 
802.11 MAC [6]. The time-period during which the network 
this approach, the channel is time-slotted, and a slotted system 
operates in the DCF mode is known as the contention-period 
requires network-wide time synchronization, which is 
(CP). Access priority to the medium is controlled through the 
relatively easy to achieve in infrastructure-based networks by 
use of inter frame spaces (IFS). There exit four types of IFS: 
using the base station as a time reference. This task becomes 
the Short IFS (SIFS), the Point coordination function IFS 
extremely difficult in distributed networks such as multihop 
(PIFS), the Distributed coordination function IFS (DIFS), and 
MANET environments [16]. Also this work considers a 
the Extended IFS (EIFS). The SIFS is the shortest interval, and 
network, where all the nodes are assumed to be within radio 
is used for transmission of acknowledgements (ACK), station 
range of each other, and only a limited number (maximum 12) 
responding to polls from the PC, and between fragments. As 
of multimedia sessions can be supported at a particular moment 
such transmissions that are required to wait only for SIFS have 
within the considered network. This is unrealistic, as MANETs 
the highest priority over the medium. The AP uses PIFS (> 
tend to be multihop, and should support as many sessions as 
SIFS) to initiate the CFP. The DIFS (> PIFS) is used by 
possible. This scheme further requires that a source, after 
ordinary nodes during the CP. The shorter the period that a 
having successfully reserved a time-slot, send a busy-indication 
transmission has to wait for, the greater the access priority it 
packet until the end of its session. This approaches increases 
has over the medium. The DCF mode consists of a four way 
the number of exposed nodes. Another similar scheme, known 
exchange: request-to-send (RTS) - clear-to-send (CTS)-
as Soft Reservation Multiple Access with Priority Assignment 
DATA-ACK. RTS is used for a node to acquire the medium 
(SRMA-PA), is presented in [8]. It is a Time Division Multiple 
after waiting for a minimum period of DIFS. The receiving 
Access (TDMA) frame based MAC protocol that allocates 
node (destination) responds with CTS after a SIFS, indicating 
stations to different time-slots. This scheme does not take 
that it is ready to receive data. The sender then completes the 
asynchronous data traffic into consideration, as all data 
packet transmission. On the other hand, in case the sender 
transmissions are required to reserve slots irrespective of 
cannot access the medium after DIFS due to the medium not 
whether they are real-time or best-effort traffic. Also there is a 
being idle, the transmission is deferred until the end of the 
possibility for higher priority traffic to starve lower priority 
current transmission. A random interval in the range of zero to 
traffic, as any higher order traffic can snap the slots already 
Contention Window (CW) is then computed by the node to 
reserved by lower priority traffics. A MAC approach that 
initialize its backoff timer. In addition to physical medium 
combines an allocation-based (TDMA) protocol and a 
sensing, virtual medium sensing is achieved by using time 
contention-based (CSMA-CA) protocol is proposed in [9]. In 
fields in the packets, which indicate to the other nodes the 
this scheme, the number of slots in each frame is dependent on 
duration of the current transmission. 
the number of nodes in the network, and hence each slot 
belongs to a single node only. The higher the number of nodes 
The PCF mode provides contention-free frame transfer and 
in the network, the larger the frame size would be. This leads to 
the time-period in which the LAN operates in the PCF mode is 
unbounded delay for time-sensitive applications. Similar 
known as the Contention-Free Period (CFP) [6]. The AP 
approach is followed in reservation CSMA-CA [3]. In this 
performs the function of the PC by gaining control of the 
scheme, CP and CFP alternate, and the CFP is based on 
medium in the beginning of the CFP, after sensing the medium 
TDMA. Since there is no node to regulate the common 
to be idle for PIFS. During the CFP, nodes that are CF-Pollable 
medium, this scheme may lead to a "stretching" problem [4]. It 
are polled by the AP. On receiving a poll, a node transmits its 
also requires proper time-synchronization, and each node is 
data after a SIFS. In order to poll the nodes, an AP must 
supposed to maintain a "slot-table" that indicates whether each 
maintain a polling-list. The CFP must alternate with the CP. 
slot is "reserved" or "available". Another MAC protocol that 
The sum of the two periods is called the "super-frame" and is 
considers multiple channels is proposed in [10]. It combines 
shown in Fig.1. The AP initiates the CFP by transmitting a 
code division multiple access (CDMA) or frequency division 
Beacon frame, and ends it by transmitting a CF-End frame. The 
multiple access (FDMA), and TDMA to create a contention-
contention-free repetition interval (CFPPeriod) is the reciprocal 
free MAC, termed the sequenced neighbor double reservation 
of the rate at which the AP initiates the CFP. To support error 
(SNDR). Since it mainly considers time-slot allocation to make 
correction, positive ACKs are used in both the DCF and PCF 
it contention-free, it fails to support asynchronous data traffic 
and requires complex slot-synchronization. 
B. Related work on MAC-LevelQoS forMANET 
Although the IEEE 802.11 DCF is meant for best-effort 
traffic, there have been some efforts that investigate 
It is difficult to compare different MAC protocols. Each has 
differentiated services at MAC-level in infrastructure-based 
been developed with a different architecture and application in 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
networks [11][12]. A similar idea can also be applied to 
MANETs. Service-differentiation is achieved by setting 
different values for CW – values of minimum (CWmin) and 
max) – for different traffic classes. Two different 
service classes such as high priority and best effort are 
considered, and the traffic packet with the smaller value of CW 
is more likely to be transmitted first [11]. There is, however, no 
explicit guarantee of the level of service differentiation. There 
have also been some proposals to make DCF to be "per-stream-
fair", as the DCF of legacy IEEE 802.11 tends to be unfair due 
to the "capture-effect" [13]. With these schemes, different 
sessions are allowed to gain access to the shared wireless 
Point Coordination Function 
medium equally. Fairness is achieved by dynamically 
modifying the CW of each traffic type by the source. The 
fairness approach does not, however, guarantee QoS support. 
Distributed Coordination 
Similarly each work presented above has its own 
drawback(s), and does not have the capability to provide MAC-
level QoS for multimedia traffic in multihop MANETs. The 
Unique Receiver-Based Code 
next section describes how our approach tries to achieve 
improved throughput for real-time periodic traffic, while 
Figure 2. Structure of Our QoS-Aware MAC. 
providing deterministic delay performance. 
III. PROPOSED APPROACH 
Having taken the common deficiencies of other approaches 
into consideration, our approach tries to support both 
asynchronous and time-sensitive multimedia traffic based on a 
hierarchical approach. In our scheme, both the DCF and PCF 
of the IEEE 802.11 are used after being modified to 
accommodate MAC-level service differentiation. Although the 
PCF does require a centralized node, we describe next how this 
can be introduced for the first time in multihop MANET with 
novelty. The motivation for this work comes from the 
observation that the PCF mode offers a "packet-switched 
connection-oriented" service which is well suited for voice as 
well as multimedia traffic. The "connection-oriented" aspect of 
the PCF mode would allow the network to provide namely 
throughput, delay, and jitter guarantees [4]. 
In order to accommodate simultaneous transmission of 
several data traffic, multiple parallel media (channels) are 
created with receiver-based spread-spectrum technology 
[2][10]. In this scheme, each node has its unique code, and 
hence its unique medium, on which it has to receive packets 
Figure 3. Working Mechanism of Our MAC. 
from others. In addition, there is a common medium, which all 
nodes can use to disseminate and acquire neighbor and routing 
In our work we have considered two different service 
related information. These codes are assumed to be orthogonal 
classes, high-priority and best-effort. Our MAC's mode of 
to each other, and assigned to nodes dynamically in a conflict-
operation on each unique medium switches between pure DCF 
free manner using the common medium. In our approach, 
mode and combined (DCF + PCF) mode depending on traffic 
transmission by any node A to another node B has to be on the 
types, and hence adapts. Each unique medium supports only 
receiver's (B's) spreading code. In order to accommodate the 
pure DCF mode of operation as long as all traffic types are 
situation in which any node can receive multiple transmissions 
best-effort. On the other hand, whenever a high-priority traffic 
initiated by different sources, IEEE 802.11 (both DCF and 
needs to be transmitted, the source node A has to send an 
PCF) is used on top of each unique medium as depicted on Fig. 
"Association Request" (AReq) frame to the forwarder (transit) 
2. The common medium, however, can support only the DCF. 
node B selected by the routing protocol [6]. This AReq frame 
Each node is expected to regulate and schedule its own unique 
is normally sent on the CP of a transit node's (B's) own unique 
medium. Also each node has to maintain constant CP and CFP 
medium (see Fig. 3). As soon as node B receives the Areq 
on its own medium in order to minimize or completely avoid 
frame, it has to send Association Response (ARes) frame to the 
the "stretching" effect [4]. This is important in order to 
originating node A on the CP of the latter's (A's) own medium. 
minimize the delay jitter experienced by applications. 
At the same time, node B has to create a polling-list and 
include node A in it. At the start of CFP on B's medium, node 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
B has to begin polling node A. In this way, any node (B) 
best-effort data traffic share the CP of a unique medium. Since 
should be able to emulate the functionality of PC, and in our 
the RIFS is shorter than the DIFS, the high-priority traffic class 
approach such a node is referred to as a virtual PC (VPC). 
has priority over the best-effort traffic, which uses DIFS. ARes 
Since node B is an intermediate node, it has to forward the 
frame is sent by any VPC, after SIFS when operating in the 
packet to its destination or the next forwarding node. DCF mode. ARes frame is sent only when admission control 
Accordingly, it would soon send the AReq frame to node C, 
module has analyzed the current load as expressed by equation 
which is here assumed to be the destination, on C's own 
(2) below. Since there is a maximum limit for high-priority 
medium. After sending ARes frame on node B's medium, node 
traffic, the probability for AReq frames of high-priority traffic 
C has to be ready to poll node B at the start of CFP on C's 
to starve the best-effort traffic during CP is minimized. This 
unique medium. If node C were to send packets back to node 
achieves the "fairness" in our scheme [13]. When a collision 
A, then it would follow the same process as node A has 
happens in the reservation process, the back-off time is 
performed, but in the opposite direction. In this way, nodes 
calculated using the following modified equation [12]: 
along a particular path (or route) become polling-list members 
of each other. It is thus important that whenever a node (A) 
Back-off-time = [ 
p 2+
i × 
rand ()]× 
Slot _ 
time  (1) 
transmits to another node (B), it has to be on the latter's (B's) medium. If the traffic type is of high priority, the source (A) 
Where p is the priority-factor with p=2 for high-priority traffic 
can transmit when the node (B) polls. This is the case even 
and p=4 for best-effort traffic, i is the transmission attempt 
when a node transmits an ACK for the packets it receives 
number, and rand() is a random function with a uniform 
correctly on its own medium. If, however, the routing protocol 
distribution in [0,1]. This ensures that the high-priority traffic 
is unable to provide the next hop address (probably during the 
class still enjoys priority over best-effort traffic during the 
route discovery process in the case of an on-demand routing 
collision-resolution period [6][12]. Although this type of 
protocol), the proposed MAC will use the common channel for 
prioritization is an important enhancement, it is not enough to 
disseminating the packet. In all other circumstances, our MAC 
provide effective traffic protection and QoS guarantees. This is 
protocol tries to minimize flooding on the common medium, 
achieved with our polling-based scheme introduced in MANET 
unless it is required depending on relative velocities as in a novel way as described below. The maximum number (Np) 
explained later. Because of the way in which transmissions are 
of high-priority traffic that can be supported in CFP, given a 
performed, our approach can completely eliminate the constant super frame size TSF, is given by equation (2)[4]. In 
exposed-terminal problem. The hidden-terminal problem is 
this case, the high-priority traffic is assumed to be a time-
minimized to a greater extend with a use of unique media, and 
sensitive periodic interactive voice service, which is generated 
with the adoption of DCF and especially PCF mode of 
using a constant bit rate (CBR) source for convenience. 
operations. In addition, each node maintains its own polling-list 
T − 
T − 
T
dynamically in order to use it on its own medium. If a polling-
ovhd  (2) 
node finds that it has not received any transmission from one of 
its polling-list members for time period greater than 
POLLING_TIME_OUT, then that node address will be deleted 
Where Tcp, Tovhd, and Tv are duration of CP, overhead involved 
from the former's polling-list immediately. This is how a 
for beacon and CF_END transmissions, and time to send a 
"disassociation" process is performed in our scheme [6]. This 
voice packet generated over a TSF [4]. In other word, the VPC 
approach leads to efficient bandwidth management, and this 
can poll to a maximum of Np number of times (or nodes) 
occurs whenever nodes move out of each other's range or have 
within a CFP on its own medium. Depending on the intensity 
finished their transmission. With this approach, a source node 
of the high-priority traffic load, any node can request a VPC to 
does not have to predict and inform others as to how long its 
poll it for more than once within each super frame period (TSF) 
transmission is going to last, which is often difficult in practice. 
of VPC. The MAC-level QoS-mapping module of a particular 
node calculates the number of times it has to be polled by any 
Our QoS-aware MAC protocol has three components: 
VPC. This calculation is based on the bandwidth requested by 
admission control, QoS-mapping and resource reservation as 
the network-level QoS mechanism. Any node can inform any 
shown in Fig. 2. Provisioning of network resources uses two 
VPC as to how many times it has to be polled by that VPC 
techniques such as resource reservation in PCF mode, and 
prioritization in the DCF mode of operation, as explained 
SF of the latter through the AReq frame – the 
AReq frame format is modified to accommodate this in our 
below. The objective of a priority-based approach is to provide 
scheme. Whenever a VPC receives an AReq frame from its 
service-differentiation by allowing faster access to the medium 
neighbors, its admission control module will check whether its 
to traffic classes with higher priority [11][12]. Like in the IEEE 
CFP period is fully utilized (ie. whether the N
802.11 DCF, priority access to the wireless medium is 
been reached). If not, the VPC is required to send the ARes 
controlled through the use of an IFS. A new IFS termed 
frame, and allocates the required bandwidth (here allocation 
Reservation IFS (RIFS) is defined and its value is selected such 
means how many times the requesting node has to be polled 
that SIFS < PIFS < RIFS < DIFS. To initiate new data 
transmission, RIFS or DIFS is used to contend for access to the 
SF of a VPC). If the maximum number has 
already been reached, then the VPC should not respond to any 
medium depending on the traffic type. A high-priority real-
AReq. In this case, the requesting node should look for another 
time (periodic) traffic uses RIFS before sending the AReq, 
appropriate forwarding node, after waiting for a period of 
while DIFS is used to gain access right for best-effort ASSO_PROC_THERESHOLD_TIME_OUT. 
asynchronous traffic as in the IEEE 802.11 DCF. In our 
approach, the transmissions of AReq and ARes frames, and 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
Since the common medium is necessary for every node to 
In our initial evaluation, we consider two performance 
disseminate and acquire routing related information and metrics: throughput and MAC delay. We performed our 
possibly to perform dynamic code assignment, each node may 
simulations using the GloMoSim [15] simulation package, in 
receive transmission from its neighbors. On the other hand, as 
which we implemented our MAC scheme, and compared it 
explained above, nodes are expected to use receiver-based 
against the DCF mode operation of the IEEE 802.11. Nodes' 
unique media for data transmission. If, however, a node 
movement was modeled by the random waypoint mobility 
decides that its relative velocity with respect to its neighbors 
model. Nodes move at a speed between 0 and 10 ms-1. The 
increases beyond a certain threshold within a short time-period, 
pause time takes a constant value of 30 seconds. Each run is 
then it cannot rely on PCF-based operation. Only in this 
executed for 300 seconds of simulation time, and models a 
circumstance, the node would use the common medium for 
network of 20 nodes placed randomly in a 500m X 500m area. 
data transmission. Each node calculates its relative velocity by 
Each node has a transmission range of 100m, and full duplex 
making power measurements from neighbors on its own 
operation is considered with two antennas per node (one for 
medium and the common medium as explained below. Under 
transmission and the other for reception). The propagation 
Friis' free space propagation model, the signal power detected, 
model is the free space model. The bandwidth is 2 Mbs-1, the 
say RxPr, at the receiving node is indicative of the distance 
data packet size is 512 bytes, and packets are sent at a rate of 
between the transmitting and receiving node pairs. Since it is 
100 to 400 per second by each node. Other important 
very difficult to calculate the exact distance between two nodes 
simulation parameters are listed in Table 1. 
without wasting bandwidth, we try to use the MOBIC model 
Fig. 4 shows the total throughput as a function of offered 
that defines a relative mobility metric, 
M rel (
Y ) , at a node X 
load for both our scheme and the DCF of IEEE 802.11. The 
with respect to node Y [14]: 
total throughput is defined here as the total number of packets 
actually delivered to their respective destinations within the 
whole network. From Fig. 4, it becomes obvious that our 
Y → 
X
scheme leads to better throughput performance. The throughput 
 
Rx Pr
Y→
X 
of IEEE 802.11 continues to drop after a slight initial increase, 
due to increased collisions and the resulting binary exponential 
Every node X determines the above mobility metric for 
backoff (BEB) scheme. As it can be seen, the throughput in our 
each neighbor Y by making subsequent power measurements, 
scheme tends to increase and soon reaches a saturation point. 
given a constant transmission power. A negative value for 
This point is dependent on Np of (2), which again depends on 
M rel (
Y ) indicates that nodes X and Y are moving away from 
the link bandwidth and the CFP repetition interval, which here 
each other, and a positive value indicates that they are moving 
takes the value of 70 milliseconds. In our simulation, for 
towards each other. For a node with m number of neighbors, 
convenience, a node determines the receiver-based code of its 
neighbor based on the latter's address. Fig. 5 depicts the 
each node X will have m such values for 
M . Each node X 
average MAC delay incurred for a high-priority packet in both 
determines the aggregate local mobility value by calculating 
schemes. The MAC delay of a node is the time between the 
the variance (with respect to zero) of the entire set of relative 
instant at which a packet comes to the head of the node's 
mobility samples 
M (
Y ) , where Y
transmission queue and the end of the packet transmission. As 
i is a neighbor of X: 
load increases, there would be increased contention, and hence 
M (
Y ) 
m = 
E ( 
rel
MAC delay tends to increase in any MAC scheme. However, 
i ]
i=
in our scheme this increase is only slight compared to the 
original DCF, and is dependent on the link bandwidth and the 
Each node X computes (3) and (4) in an attempt to calculate 
CFP repetition interval. Reducing the inter-poll period or T
its relative velocity with respect to its neighbors. A low value 
can further reduce the delay in our scheme [4]. On the other 
for Mx indicates that node X is relatively less mobile with 
hand, in the DCF, the MAC delay tends to increase 
respect to its neighbors, while a higher value indicates that 
significantly with the number of sessions. This can be 
node X is highly mobile. Whenever Mx exceeds Mthreshold, node 
attributed to such factors as increased collision, and hence 
X has to rely on the common medium for data transmission. In 
this way, our QoS-aware MAC adapts depending on relative 
increased retransmission attempts and extended BEB delay. 
mobility information. 
IV. EVALUATION THROUGH SIMULATION 
IMPORTANT SIMULATION PARAMETERS 
Parameter Value 
Duration of the Superframe (T
Value of the CFP (Tcfp) 50,000 
The SIFS interval 
The PIFS interval 
The RIFS interval 
Total Offered Load
The DIFS interval 
Figure 4. Total Throughput as a function of Offered Load. 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
minimizes the need for re-transmissions. This fact will in turn 
conserve scarce resources such as battery power and 
bandwidth. As explained, the MAC functionality of a node is 
adaptive, depending on relative node velocities. Since this 
work is mainly based on the IEEE 802.11 standard, it can be 
relatively easily integrated into existing systems. We plan to 
extend this work in the future with the use of the recent IEEE 
802.11e standard in order to support multiple traffic classes. 
[1] D.H.Cansever, A.M.Michelson, and A.H.Levesque, "Quality of Service 
Support in Mobile ad-hoc IP Networks", 
Proc. Military 
Average MAC Delay (milliseconds)
Comm.unications Conf. (MILCOM1999), vol. 1, Nov. 1999, pp. 30 – 34. 
[2] M.Joa-Ng, and I-T.Lu, "Spread Spectrum Medium Access Protocol with 
Collision Avoidance in Mobile Ad-hoc Wireless Networks",
 Proc. 18th 
Annual Joint Conference of the IEEE Computer and Communications 
Number of Sessions
Societies (INFOCOM'99)
, vol. 2, Mar. 1999, pp. 776 – 783. 
Figure 5. MAC Delay as a function of Number of Sessions. 
[3] I.Joe, and S.G.Batsell, "Reservation CSMA/CA for Multimedia Traffic 
over Mobile Ad-hoc Networks", 
Proc. Int'l Conf. On Communications. 
(ICC 2000), vol. 3, Jun. 2000, pp. 1714 – 1718. 
[4] M.Veeraraghavan, N.Cocker, and T.Moors, "Support of Voice Services 
in IEEE 802.11 Wireless LANs", 
Proc. 20th Annual Joint Conference of 
the IEEE Computer and Communications Societies (INFOCOM 2001)
, 
vol. 1, Apr. 2001, pp. 488 – 497. 
[5] J-Y.Yeh, and C.Chen, "Support of Multimedia Services with the IEEE 
802.11 MAC Protocol", 
Proc. Int'l Conf. on Communications. (ICC 
2002), vol. 1, May. 2002, pp. 600 – 604. 
[6] IEEE Draft International Standards, "Part 11:Wireless LAN Medium 
Access Control (MAC) and Physical Layer (PHY) Specifications", 
ISO/IEC 8802-11, IEEE P802.11/ D10, Jan. 1999. 
[7] V.N.Muthiah, W.C.Wong, "A Speech-Optimised Multiple Access 
Scheme for a Mobile Ad Hoc Network", 
Proc. 1st Annual Workshop on 
Mobile and Ad Hoc Networking and Computing (MobiHOC 2000), Aug. 
2000, pp. 127 – 128. 
[8] C.W.Ahn, C.G.Kang, and Y.Z.Cho,
 "Soft reservation multiple access 
Figure 6. Normalized Throughput as a Function of Maximum Speed and 
with priority assignment (SRMA/PA): a novel MAC protocol for QoS-
Number of Sessions. 
guaranteed integrated services in mobile ad-hoc networks", 
Proc. 52nd IEEE Vehicular Technology Conference (VTS-Fall 2000)
 , vol. 2, Sep. 
Fig. 6 shows the performance of our scheme for different 
2000, pp. 942 – 947. 
mobile speeds. In this simulation, the normalized throughput 
[9] I.Chlamtac, A.Farago, A.D.Myers, V.R.Syrotiuk, and G.Zaruba, 
performance of our scheme is observed by varying both the 
"ADAPT: A Dynamically Self-Adjusting Media Access Control Protocol for Ad Hoc-Networks", 
Proc. Global Telecommunications 
maximum speed of each mobile node and the offered load. The 
Conference, 1999, GLOBECOM '99, vol. 1A, pp. 11 – 15. 
normalized throughput is defined here as the total number of 
[10] Z.Cai, and M.Lu, "SNDR: a new medium access control for multi-
packets actually delivered to their respective destinations 
channel ad hoc networks", 
Proc. 51st IEEE Vehicular Technology 
divided by the total number of packets generated within the 
Conference (VTS-Spring 2000)
 , vol. 2, May. 2000, pp. 966 – 971. 
whole network. The minimum speed and the pause time of 
[11] M.Barry, A.T.Campbell, and A.Veres, "Distributed Control Algorithms 
each node are kept at constant values of 0 ms-1 and 30 seconds 
for Service Differentiation in Wireless Packet Networks", 
Proc. 20th 
respectively throughout this simulation run. As it can be seen, 
Annual Joint Conference of the IEEE Computer and Communications 
Societies (INFOCOM 2001)
, vol. 1, Apr. 2001, pp. 582 – 590. 
the throughput is affected by the speed. Also it can be noted 
[12] I.Aad, and C.Castelluccia, "Differentiation Mechanisms for IEEE 
that our scheme leads to better throughput and delay 
802.11", 
Proc. 20th Annual Joint Conference of the IEEE Computer and 
performance, when nodes move as groups in the same 
Com. Societies (INFOCOM 2001)
, vol. 1, Apr. 2001, pp. 209 – 218. 
direction. This is the case in battlefields and other similar 
[13] B.Bensaou, Y.Wang, and C.C.Ko, "Fair Medium Access in 802.11 
Based Wireless Ad Hoc Networks", 
Proc. 1st Annual Workshop on Mobile and Ad Hoc Networking and Computing (MobiHOC 2000), Aug. 
2000, pp. 99 – 106. 
V. CONCLUSIONS AND FUTURE WORK 
[14] P.Basu, N.Khan, and T.D.C.Little, "A Mobility Based Metric for 
In this paper we presented a QoS-aware MAC protocol for 
Clustering in Mobile Ad Hoc Networks", 
Proc. Int'l Conf. on 
multimedia traffic in MANETs and evaluated its performance 
Distributed Computing System, Apr. 2001,
 pp. 413 – 418. 
through simulation. The proposed protocol introduces a packet 
[15] X.Zengu, R.Bagrodia, and M.Gerla, "GloMoSim: A Library for Parallel 
switching concept based on the PCF in multihop MANET in a 
Simulations of Large-scale Wireless Networks", Proceedings of the 12th 
Workshop on Parallel and Distributed Simulations, May 1998. 
novel way. Simulation results confirm the performance [16] A.Chandra, V.Gummalla, and J.O.Limb, "Wireless Medium Access 
(throughput, delay) improvements of our scheme. In addition, 
Control Protocols", IEEE Communications Surveys & Tutorials, Second 
our proposed approach leads to fewer collisions and hence 
Quarter 2000, vol. 3, no. 2. 
WCNC 2004 / IEEE Communications Society
0-7803-8344-3/04/$20.00  2004 IEEE
Source: https://www.ee.ucl.ac.uk/~gpavlou/Publications/Conference-papers/Siva-04a.pdf
    Rambabu.Kuchi et al, Research Desk, 2012, Oct-Dec, 1(2).66-73 ISSN 2319-7315  A NOVEL RP-HPLC METHOD FOR THE QUANTIFICATION OF TADALAFIL IN FORMULATIONS  Gudipati Edukondalu, Mahaboob.Subhani. D. Nunna.Bhaskar Raju, Ashok Kumar varma, Rambabu Kuchi*  Dept of P.G Chemistry, D. N. R College, Bhimavaram, West Godavari (D.T) Andra Pradesh, India 
    Psychotropic Drug Series Published by Citizens Commission on Human Rights C6397 Violence and Suicide Bklt_Version3.indd 1 2/23/10 11:27:42 AM This report is an overview of the side  effects of common psychiatric drugs known to  cause violent and suicidal behavior. It contains  information that is important for you to know.  Courts have determined that informed  consent for people who receive prescriptions for psychotropic (mood-altering) drugs must