RTS/CTS Framework Paradigm and WLAN Qos Provisioning Methods
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 2
Abstract
Wireless local area network (WLAN) communications performance design and management have evolved a lot to be where they are today. They went through some technology’s amendments and innovations. But, some performance tools remained almost unchanged and play a fundamental role in contemporary networking solutions despite the latest innovations higher influence on their indisputable and important function. That is the case with Request to send (RTS) and consent to receive (CTS) protocols. They are among the former technologies, which helped for transmission control with better performance in WLAN environment. They are so important, particularly since the advent of sensitive data networking (e.g. internet telephony, audio and video materials distribution) over the internet protocol (IP). Up to recent years following today’s multimedia WLAN based networks deployment trends, RTS/CTS) contributed to provide networks with some expected good performance levels prior to the discovery of more sophisticated methods for this purpose (i.e. performance enhancements). And yet, one may question whether the new technologies have rendered RTS/CTS frameworks obsolete; or are they now used only for some specific network applications traffic management? This articles review attempts to comprehensibly study some of the research works, which have had interest in RTS/CTS mechanism as tools for WLAN applications performance support. Various researches have studied these tools from their early innovation as network node’s built-in component, through different frameworks associated with WLAN legacy (IEEE 802.11) MAC protocols. This paper analyzed RTS/CTS initial implementation as mere network performance solution from packets’ collision avoidance perspective; and then for transmission delay due to hidden nodes and their false deployment. The article closes up on a critical analysis on the possible long time contribution of these protocols into integrated schemes based WLAN QoS performance design.
Authors and Affiliations
Mohamed Nj, S. Sahib, N. Suryana, B. Hussin
Evaluating Confidentiality Impact in Security Risk Scoring Models
Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes...
Flow-Based Specification of Time Design Requirements
This paper focuses on design requirements in real-time systems where information is processed to produce a response within a specified time. Nowadays, computer control applications embedded in chips have grown in signifi...
A Review of Secure Authentication based e-Payment Protocol
The growth of e-commerce platform is increasing rapidly and possesses a higher level of hazard compared to standard applications as well as it requires a more prominent level of safety.Additionally, the transaction and t...
Web Service Testing Techniques: A Systematic Literature Review
These days continual demands on loosely coupled systems have web service gives basic necessities to deliver resolution that are adaptable and sufficient to be work at runtime for maintaining the high quality of the syste...
An approach of inertia compensation based on electromagnetic induction in brake test
This paper briefly introduced the operational principle of the brake test bench, and points out the shortcomings when controlling the current of brake test, which means the reference measuring data is instantaneous. Aime...