Power-Controlled Data Transmission in Wireless Ad-Hoc Networks: Challenges and Solutions
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
Energy scarcity and interference are two important factors determining the performance of wireless ad-hoc networks that should be considered in depth. A promising method of achieving energy conservation is the transmission power control. Transmission power control also contributes to the mitigation of interference thereby promotes throughput by means of rendering multiple hosts to communicate in the same neighborhood simultaneously without impairing each other’s transmissions. However, as identified previously in the literature, traditional hidden terminal problem gets deteriorated when transmission power control mechanism is intended to be applied. In this article, we discuss the primary details about the power usage and throughput deficiency of the traditional 802.11 RTS/CTS mechanism. Improvements by means of power control are introduced as well as the solutions to the challenges likely to emerge because of the usage of diverse power levels throughout the network.
Authors and Affiliations
Bilgehan Berberoglu, Taner Cevik
A Review on Parameters Identification Methods for Asynchronous Motor
The decoupling of excitation current and torque current is realized by Vector control so that the speed regulating performance of asynchronous motor is comparable with that of dc motor. The control precision is directly...
Software Defined Security Service Provisioning Framework for Internet of Things
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking...
A Method for Segmentation of Vietnamese Identification Card Text Fields
The development of deep learning in computer vision has motivated researches in related fields, including Op-tical Character Recognition (OCR). Many proposed models and pre-trained models in the literature demonstrate th...
A Survey on Tor Encrypted Traffic Monitoring
Tor (The Onion Router) is an anonymity tool that is widely used worldwide. Tor protect its user privacy against surveillance and censorship using strong encryption and obfuscation techniques which makes it extremely diff...
A Low Power Consuming Model of Parallel Programming for HPC System
For most of the past five decades, the growing computational power of supercomputers has come primarily from a doubling of clock frequency every 18 months. Over this time period, the clock rate increased by six orders of...