Cluster Computing

, Volume 22, Supplement 5, pp 12029–12036 | Cite as

Congestion control and packet recovery for cross layer approach in MANET

  • M. S. GowthamEmail author
  • Kamalraj Subramaniam


Mobile Adhoc network is a network, which has advances of dynamic topology, mobility of nodes and congestion control. It is also an infrastructure less networks. This paper “Congestion control and packet Recovery for cross layer approach” is proposed. Traffic of packets occurred due to congestion and contention problems are reduced in datalink layer and transport layer. Also ensuring that, the superior performance of congestion is a challenging model due to changes in link layer contentions, topological changes and characteristic of wireless channel. The features of this model were localized packet recovery, deterministic, ability to trade of efficiency and peer to peer recovery. It can retrieve the missing packets by storing the copy of packet. Also by assigning priority order to the packets, data traffic congestion rate of higher and lower priority packets are maintained. This will develop the high priority flow to get desired access to the medium and its flow rate of low priority is adjusted, in order to have high flow rate of higher priority. Therefore the overall performance gives the better result than existing method. The simulation of CCPRCLA is verified using ns2 simulator, then graph and experimental results are discussed.


MANET Congestion control Contention control Packet recovery Priority order 


  1. 1.
    Nazir, K.M., Rehman, R.U., Nazir, A.: A novel review on security and routing protocols in MANET. Commun. Netw. 8, 205–218 (2016)CrossRefGoogle Scholar
  2. 2.
    Abinaya, S., Arulkumaran, G.: Detecting black hole attack using fuzzy trust approach in MANET. Int. J. Innov. Sci. Eng. Res. 4(3), 102–108 (2017)Google Scholar
  3. 3.
    Ahmed, A.S., Kumaran, T.S., Syed, S.S.A., Subburam, S.: Cross-layer design approach for power control in mobile ad hoc networks. Egypt. Inform. J. 16, 1–7 (2015)CrossRefGoogle Scholar
  4. 4.
    Dalal, P., Sarkar, M., Dasgupta, K., Kothari, N.: Link layer correction techniques and impact on TCP’s performance in IEEE 802.11 wireless networks. Commun. Netw. 6, 49–60 (2014)CrossRefGoogle Scholar
  5. 5.
    Teng, Y., Wang, H., Jing, M., Lian, Z.: A study of improved approaches for TCP congestion control in ad hoc networks. Proc. Eng. 29, 1270–1275 (2012)CrossRefGoogle Scholar
  6. 6.
    Dalal, P., Dasgupta, K.S.: TCP performance issues and related enhancement schemes over wireless network environment. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(4), 453–459 (2012)Google Scholar
  7. 7.
    Bastin, G., Guffens, V.: Congestion control in compartmental network systems. Syst. Control Lett. 55, 689–696 (2006)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Kaur, G., Kaint, K., Kumar, R.: Congestion control in MANET using various approaches: a review. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(6), 846–850 (2016)Google Scholar
  9. 9.
    Hu, X., Guo, W.: Congestion control in wireless software defined networks with propagation delay and external interference: a robust control approach. Mob. Inform. Syst. (2016).
  10. 10.
    Sandeep, J., Kumar, J.S.: Efficient packet transmission and energy optimization in military operation scenarios of MANET. Proc. Comput. Sci. 47, 400–407 (2015)CrossRefGoogle Scholar
  11. 11.
    Nahm, K., Helmy, A., Kuo, C.J.: Cross-layer interaction of TCP and ad hoc routing protocols in multihop IEEE 802.11 networks. IEEE Trans. Mob. Comput. 7(4), 458–469 (2008)CrossRefGoogle Scholar
  12. 12.
    Ho, C.-Y., Chen, Y.-C., Chan, Y.-C., Ho, C.-Y.: Fast retransmit and fast recovery schemes of transport protocols: a survey and taxonomy. Comput. Netw. 52, 1308–1327 (2008)CrossRefGoogle Scholar
  13. 13.
    Li, Y., Papachristodoulou, A., Chiang, M., Calderbank, A.R.: Congestion control and its stability in networks with delay sensitive traffic. Comput. Netw. 55, 20–32 (2011)CrossRefGoogle Scholar
  14. 14.
    Kuzmanovic, A., Knightly, E.W.: Receiver-centric congestion control with a misbehaving receiver: vulnerabilities and end-point solutions. Comput. Netw. 51, 2717–2737 (2007)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of ECEKarpagam Academy of Higher EducationCoimbatoreIndia

Personalised recommendations