Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Computing | en_US |
dc.contributor.advisor | Lou, Wei (COMP) | - |
dc.creator | Zou, Rongyuwei | - |
dc.identifier.uri | https://theses.lib.polyu.edu.hk/handle/200/8382 | - |
dc.language | English | en_US |
dc.publisher | Hong Kong Polytechnic University | - |
dc.rights | All rights reserved | en_US |
dc.title | An interference-aware power control MAC protocol for collision avoidance in wireless ad hoc networks | en_US |
dcterms.abstract | The wireless ad hoc networks, which doesn't rely on fundamental infrastructure, has the features of convenient and quick networking, high reliability and well flexibility. The transmission power of a station decides its transmission range, carrier sense range and interference range. It further affects the topology and spatial reuse of the station, which will influence network performance ultimately. Besides, the battery capacity is limited while the transmit energy consumption is the most of network energy consumption. Thus, power control at transmitter side is an important direction of wireless network. Another important direction is the data collision problem. In this dissertation, two mechanisms, DCF mechanism of CSMA/CA and symbol-level detection mechanism, are introduced to analyze the data collision problem in detail. DCF mechanism is a relatively simple RTS/CTS mechanism that cannot solve the hidden terminal problem fundamentally. A remote hidden terminal problem has been pointed out. When the hidden terminal is beyond the transmission range of the receiver, it cannot correctly decode the CTS packet and may cause data collision in wireless network. The symbol-level mechanism proposes a new RTS/S-CTS frame based on the standard RTS/CTS mechanism. It adds a signature detection block S-NAV to makes nodes, which beyond the receiver's transmission range, can correctly decode the S-CTS frame, thus solve the remote hidden terminal problem to the utmost extent. Since the S-CTS frame can be detected from destination that locates much farther than the transmission range, a power control mechanism is proposed based on the RTS/S-CTS mechanism in this dissertation. An S-Pr block, which restores the received power level information, is attached to the end of PHY layer for signature detection. Since the S-CTS' and ACK packet is relatively smaller than DATA packet, the RTS/S-CTS' mechanism makes power control at transmitter side to control the transmission power of RTS and DATA packet, and guarantees that all concurrency communication will not be collided. The dissertation finally evaluates the network performance of DCF mechanism, RTS/S-CTS mechanism and the RTS/S-CTS' mechanism on NS2 simulator. Compares the energy consumption and throughputs among the three mechanisms, the RTS/S-CTS' mechanism performance best with lower energy consumption and higher network throughputs. | en_US |
dcterms.extent | ix, 45 pages : illustrations (some color) | en_US |
dcterms.isPartOf | PolyU Electronic Theses | en_US |
dcterms.issued | 2016 | en_US |
dcterms.educationalLevel | All Master | en_US |
dcterms.educationalLevel | M.Sc. | en_US |
dcterms.LCSH | Ad hoc networks (Computer networks) | en_US |
dcterms.LCSH | Wireless communication systems. | en_US |
dcterms.LCSH | Hong Kong Polytechnic University -- Dissertations | en_US |
dcterms.accessRights | restricted access | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
b28564200.pdf | For All Users (off-campus access for PolyU Staff & Students only) | 2.31 MB | Adobe PDF | View/Open |
Copyright Undertaking
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item:
https://theses.lib.polyu.edu.hk/handle/200/8382