On the Construction of QoS Based Overlay Architecture for Wireless Local Area Network

被引:0
|
作者
N. V. S. Sree Rathna Lakshmi
N. Bhalaji
B. Sivakumar
机构
[1] Agni College of Technology,Department of ECE
[2] SSN College of Engineering,Department of Information Technology
[3] Adhiparasakthi Engineering College,Department of Information Technology
来源
Wireless Personal Communications | 2016年 / 90卷
关键词
Wireless local area network; Overlay architecture; Quality of service; Collision probability; Gateway nodes and QoS based overlay architecture;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless local area network is mostly used in home and office buildings within limited coverage area and for limited users. To increase the coverage range and number of users, we have introduced different types of overlay architectures with the help of controlled load virtual link. This type of virtual links will increase the collision and delay due to heavy traffic. The service overlay network is utilizes more bandwidth that reduces the throughput. To overcome all those issues, we proposed a new architecture as quality of service (QoS) based overlay architecture. This architecture uses the gateway nodes between the overlay nodes that will monitor the status of the channel medium and intimate about the medium to all the overlay nodes to reduce the delay and collision during the high traffic condition. This proposed QoS based overlay architecture increases the throughput and delivery rate. Simulation results analyze the performance of the proposed QoS based overlay architecture by using the QoS parameters. This proposed QoS based overlay architecture increases the overall network performance in different levels of gateway nodes.
引用
收藏
页码:817 / 829
页数:12
相关论文
共 50 条
  • [31] Performance improvement for 802.11 based wireless Local Area Networks
    Zhang, Liang
    Shu, Yantai
    Yang, Oliver
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (04) : 910 - 917
  • [32] Comparison of Protocol Based on Architecture in Wireless Multimedia Sensor Network
    Doorwar, Minaxi
    Malathi
    2018 2ND IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN - 2018), VOL II, 2018, : 39 - 43
  • [33] Dynamic Transmit Power Control Algorithm in Centralized Wireless Local Area Network
    Li, Ke
    Zhang, Zhifei
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 304 - 307
  • [34] Real-time Network Traffic Classification Technique for Wireless Local Area Networks Based on Compressed Sensing
    Balouchestani, Mohammadreza
    COMPRESSIVE SENSING VI: FROM DIVERSE MODALITIES TO BIG DATA ANALYTICS, 2017, 10211
  • [35] HOMEPLANE: An Architecture for a Wireless Home Area Network with Management Support for High Quality of Service
    Schilling, Christian
    Langhammer, Nils
    Aznar, Beatriz
    Kays, Ruediger
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2425 - 2429
  • [36] QoS-Based Composition of Service Specific Overlay Networks
    Al Ridhawi, Yousif
    Karmouch, Ahmed
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (03) : 832 - 846
  • [37] Using policy-based MPLS management architecture to improve Qos on IP network
    Department of Information Management, China University of Technology, 3 Chung Shan Road, Hukou, Hsinchu, Taiwan
    不详
    WSEAS Trans. Comput., 2008, 5 (341-350): : 341 - 350
  • [38] A QoS Framework with Traffic Request in Wireless Mesh Network
    Fu, Bo
    Huang, Hejiao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2009, 5682 : 418 - 427
  • [39] Using policy-based MPLS management architecture to improve QoS on IP network
    Chen, Ruey-Shun
    Tsai, Yung-Shun
    Yeh, K. C.
    Sun, Chia-Ming
    Chen, H. Y.
    PROCEEDINGS OF THE WSEAS INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING: SELECTED TOPICS ON CIRCUITS, SYSTEMS, ELECTRONICS, CONTROL & SIGNAL PROCESSING, 2007, : 527 - +
  • [40] SIM-based subscriber authentication for wireless local area networks
    Tsai, YR
    Chang, CJ
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 468 - 473