DCF Improvement for Satisfactory Throughput of 802.11 WLAN
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
As demand for deployment and usage is increased in WLAN environment, achieving satisfactory throughput is one of the challenging issues. Initially as WLAN environment is data centric, the best effort delivery based protocol serve the purpose up to certain extent. With multimedia traffic protocol fails to deliver required traffic. The requirement of satisfactory network performance is delivery of QoS. The QoS demand controlled jitter and delay, dedicated bandwidth etc. This triggers various approaches of modifying existing protocol to achieve acceptable throughput to satisfy user requirement. In this paper we will discuss how WLAN MAC protocol responds to network traffic and the shortcomings of existing protocol while responding it.
Authors and Affiliations
Ashwini Dalvi , Pamukumar Swamy , B B Meshram
A Survey on Service Oriented Architecture and Metrics to Measure Coupling
One of the goals of Service-Oriented Computing (SOC) is to design loosely coupled modules or services in the system, so that any changes or modifications to a module or service during maintainability would not effect the...
Ultrasonic Sensor Based 3D Mapping & Localization
This article provides a basic level introduction to 3D mapping using sonar sensors and localization. It describes the methods used to construct a low-cost autonomous robot along with the hardware and software used as wel...
Optimizing a multiple criteria dynamic layout problem using a simultaneous data envelopment analysis modeling Optimizing a DLP using DEA<br />
The main characteristic of today's manufacturing environments is volatility. Under such a volatile environment some parameters like demand is not stable. To operate efficiently under such environments, the facilities mus...
Enhancement of Network Security Techniques using Quantum Cryptography
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies comple...
Review of Impulse Noise Reduction Techniques
This Paper presents survey of impulse noise reduction techniques. In this paper around ten most popular techniques are implemented and compared. Results of all algorithms are analyzed and efficiency of algorithms is calc...