Dynamic Proportional Delay Differentiation Scheduling over IEEE 802.11 Wireless Network

Author(s):  
Kyungae Yoon ◽  
JongWon Kim
2014 ◽  
Vol 2014 ◽  
pp. 1-7
Author(s):  
Salma Rattal ◽  
Abdelmajid Badri ◽  
Mohammed Moughit

Nowadays, VoIP is a technology with a great demand and wireless networks are increasingly deployed. Each of these has its own technology constraints. For VoIP, it is very important to take into consideration the need to provide a high quality service according to well-defined standard transmission (jitter, end-to-end delay, MOS, and packet loss). However, wireless networks (IEEE 802.11) are based on radio which undergoes a number of technical constraints to achieve theoretical transmission rates; among these constraints the number of users of the networks, the distance between the client and the access, and the amount of data transmitted point are included. In this term, a study is made by simulating wireless network in OPNET Modeler with a fairly large number of VoIPs (15 users) whose signaling is handled via a new node that was created specifically to manage the signaling tasks under SIP and H.323 in order to minimize the number of nodes in the network and avoid the congestion. In this paper, two scenarios are compared; the first contains a number of VoIP users with SIP and H.323 signaling handled by the new created device; the second scenario is similar to the first except that the distance between the stations is remarkably lower.


2019 ◽  
Vol 118 (7) ◽  
pp. 27-33
Author(s):  
P.Prasanya Devi ◽  
R.S. Kannan ◽  
M. Ravindran

In this paper, we describe Wireless networks have seen unprecedented rise in their size and number of users in recent years. This unprecedented rise is attributed to the rise in the number of mobile computing devices. Moreover the amount of data that is handled by these wireless networks has increased in recent years. One such wireless network that is widely used but is still prone to attacks is WiFi. Wi-Fi protocol (IEEE 802.11), over the years has been upgraded many times, but these upgrades have mainly resulted in increase in the overall data rate of the communication. Little has been done to improve the security of the protocol. This research focuses on inherent flaws in Wired Equivalent Privacy protocol (WEP) used by the 802.11 standard, Temporal Key Integrity Protocol (TKIP) which is considered an interim solution to legacy 802.11 equipment. The demand for ubiquitous personal communications is driving the development of wireless networks that can accommodate mobile voice and data users who move throughout buildings, cities, or countries. The objective of this chapter is to provide the fundamentals of wireless networks so that the general readers can be able to easily grasp some of the ideas in this area.


Sign in / Sign up

Export Citation Format

Share Document