Towards Energy Efficient and Quality of Service Aware Cell Zooming in 5G Wireless Networks

Author(s):  
Hafiz Yasar Lateef ◽  
Muhammad Zeeshan Shakir ◽  
Muhammad Ismail ◽  
Amr Mohamed ◽  
Khalid Qaraqe
2010 ◽  
Vol 4 (14) ◽  
pp. 1696 ◽  
Author(s):  
L.-S. Meng ◽  
J.-P. Cheng ◽  
P.-C. Yeh

2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2021 ◽  
Vol 1964 (4) ◽  
pp. 042086
Author(s):  
K Radhika ◽  
Y Murali Mohan Babu ◽  
J K Periasamy ◽  
T R Saravanan

2021 ◽  
Vol 3 (1) ◽  
pp. 1-10
Author(s):  
Smys S ◽  
Wang Haoxiang

Various industrial, scientific and commercial processes involve wireless mesh networks in the recent days. These technologies improve communication technology to a large extent which has led to an increase in utilization of these systems in various fields. In application with intense and complex data flow, improving the quality of service (QoS) has been a challenge and a focus of research leading to more advanced wireless communication systems. This paper provides a novel optimization algorithm for improving the QoS in hybrid wireless networks while preventing malware and routing attacks. The concept of QoS and hybrid wireless networks are examined at the initial stage. Further, the algorithm for optimizing the service quality in the network is proposed accordingly. The ability of data transfer is benefited by data packets in this algorithm. Load distribution is performed such that overcrowding is prevented and information routing is done efficiently though the nodes. Delay or routing is created and control messages are sent for withholding data when certain nodes are overcrowded. This reduces the delay created by overcrowding by 50% while maintaining the permittivity.


Sign in / Sign up

Export Citation Format

Share Document