Dynamic Perfromance of an Enhanced Cooperative Strategy for Qos Improvement in Wlan
نویسندگان
چکیده
In Wireless Local Area Network, wireless node will suffer due to the hidden terminal node. This hidden terminal node leads to high collision, high drop rate of packets and high delay. To avoid this hidden terminal node, wireless nodes use the control messages to know the status of the destination nodes. Another issue in the WLAN is less coverage range with lesser number of nodes. To increase the more number of users as well as the Quality of Services in the Wireless Local Area Network, a new scheme as an Enhanced Cooperative Strategy for QoS Improvement (ECQI) is proposed. This proposed Enhanced Cooperative Strategy for QoS Improvement scheme uses the cooperative nodes between the source and destination node. Source node selects the Least Hop Count (LHC) path to transmit the data. Each cooperative node will amplify and forward the data. After every data transmission, transmitter node will wait for the acknowledgment. If the acknowledgment is not received within a particular threshold time interval, cooperative node will selects an alternate path based on the Least Hop Count path. Experimental results analyze the overall network performance using the Quality of Service parameters such as throughput, delay, drop rate, delivery rate, collision probability and network efficiency. The proposed Enhanced Cooperative Strategy for QoS Improvement scheme will increase the delivery rate, throughput, network efficiency and decreases the delay, drop rate and collision probability. KeywordsQoS ; Least Hop Count; throughput ; collision ; ECQI
منابع مشابه
QoS provisioning for large-scale multi-ap WLANs
Large-scale deployment of IEEE 802.11 wireless LANs (WLANs) with a high density of access points (APs) has become commonplace due mainly to its potential for numerous benefits, such as ubiquitous service coverage, seamless handover, and improved link quality. However, the increased AP density can induce significant channel contention among neighboring cells, thus causing severe performance degr...
متن کاملAdvanced operations research techniques for multi-constraint QoS routing in internet
Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...
متن کاملCooperative Control of Multiple Quadrotors for Transporting a Common Payload
This paper investigates the problem of controlling a team of Quadrotors that cooperatively transport a common payload. The main contribution of this study is to propose a cooperative control algorithm based on a decentralized algorithm. This strategy is comprised of two main steps: the first one is calculating the basic control vectors for each Quadrotor using Moore–Penrose theory aiming at coo...
متن کاملUser-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual Optimality
We study optimal user-network association in an integrated 802.11 WLAN and 3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of WLAN and UMTS networks and a single QoS class of mobiles arriving at an average location in the hybrid cell, we formulate the problem with two different approaches: Global and Individual optimality. The Globally optimal association is formulat...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کامل