Preview

Ieee

Good Essays
Open Document
Open Document
502 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ieee
Control Theoretic Based Network Configuration

Abstract:

The optimal configuration of the contention parameters of a WLAN depends on the network conditions in terms of number of stations and the traffic they generate. Following this observation, a considerable effort in the literature has been devoted to the design of distributed algorithms that optimally configure the WLAN parameters based on current conditions. In this paper, we propose a novel algorithm that, in contrast to previous proposals which are mostly based on heuristics, is sustained by mathematical foundations from multivariable control theory. A key advantage of the algorithm over existing approaches is that it is compliant with the 802.11 standard and can be implemented with current wireless cards without introducing any changes into the hardware or firmware.We study the performance of our proposal by means of theoretical analysis, simulations, and a real implementation. Results show that the algorithm substantially outperforms previous approaches in terms of throughput and delay.

Existing system:
The existing two or more stations can form a temporary network with out need of any existing network infrastructure or centralized administration. In MANETs, stations act as routers themselves, keeping route information to reach other, and stations helping forward data.Packets sent from one stations to another. A partition denotes a set of stations that have (one-hop/multi hop) communication paths between two arbitrary stations, and no path exists between any pair of stations in different partitions. If too many stations use too small CWs, then the collision rate will be very high and consequently throughput performance will be low. Similarly,if few stations contend with too large CWs, the attempt rate will be low and the channel will be underutilized most of the time, yielding a poor throughput performance also in this case. When the collision probability is far from its desired value, the

You May Also Find These Documents Helpful

  • Powerful Essays

    sample IEEE paper

    • 1264 Words
    • 6 Pages

    their own paper. WORD users can also download the template file for WORD posted on the WCCI 06 website.…

    • 1264 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Non overlapping channels: In wireless LANs, channels used for sending data for which the frequencies do not overlap, which allows multiple devices to sed data at the same time on the same place.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    While an 802.11b/g model for wireless networking using a traditional centralized WLAN switch might work, this solution is very expensive and has several limitations. This type of model is prone to inefficient application delivery, performance bottlenecking, and having a single point of failure depending on the health of the centralized WLAN switch.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    * While consumer PC products have just started to migrate to much higher bandwidth 802.11n, now the work on next generation WLAN standard definition is already in progress. Named as 802.11ac, it is expect to boost the network bandwidth up to 1Gbps, on par with what can be achieved by wired networking in today’s PC world.…

    • 820 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The IEEE 802.11n draft standard is intended to improve WLAN data rates and range without requiring additional power or RF band allocation.…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Standardsresearch

    • 1197 Words
    • 5 Pages

    IEEE 802.22. (2012, January 15). Working group for wireless regional area networks. Retrieved from http://standards.ieee.org/news/2011/80222wg_award.html…

    • 1197 Words
    • 5 Pages
    Better Essays
  • Good Essays

    1.One main part WSNs consists of a number of sensor nodes which are working together to collect the information from the remote sensing areas. The WSNs are divided into group or cluster based on the characteristics of the network. The elected cluster head serves their cluster nodes or child nodes. Consider the propagation from the cluster head to the cluster nodes of a dynamic code division multiple access systems with N bands (or subcarriers). The N bands are shared among their group nodes with help of the CHs. Spectrum sensing is performed periodically by CHs; transmit a data to each group nodes through pre-allocated subcarriers. Busy bands are bands that the node in the cluster cannot use because of another node activity. The cluster head uses power control to maintain dynamic signal strength values for every node in a group depends on their propagation distance.…

    • 475 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The National Institute of Standards and Technology (NIST), according to Robertson (2010) increased its participation in fire prevention when the Fire Research Act of 1968 was inacted by congress. The Building and Fire Research Labatory is broken into three categories and conducts research in fire science, fire engineering, and fire safety (Robertson, 2010).…

    • 126 Words
    • 1 Page
    Good Essays
  • Good Essays

    The advent of wireless technology is due in part to the ever increasing demands for mobility and flexibility in our daily lives. A wireless LAN (WLAN) is based on cellular architecture where the system is subdivided into cells,…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    With the introduction of wireless edge devices on a network it has an increase in performance and freedom compared to those who use a wired connection. With fewer user on the wireless network than on the wired network, traffic and user are fewer, which makes the network faster comparably. But as we have learned, increases in wireless traffic have problems like physical obstacles, interference from other wireless devices, the distance from an access point, and access rights to other…

    • 1245 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In 1978, the Electronics Technicians Association is a US based not-for-profit represents the electronics industry, and a professional association promoting excellence in technologies through certification. ETA has issued over 150,000 technical certifications covering more than 80 certification programs in a variety of technology industries such as basic electronics, fiber optics, data cabling, renewable energy, information technology, biomedical, avionics, wireless communications, and etc. ETA works with technicians, educators, and military personnel. Also ETA partners with companies such as Motorola, Google, and United States Armed Forces.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network Management

    • 923 Words
    • 4 Pages

    Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance.…

    • 923 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Electro Industries

    • 1492 Words
    • 6 Pages

    Electro Industries are a large diversified manufacturer of computer systems, industrial electronics, electronic components and consumer electronics and a supplier of a broad range of services.…

    • 1492 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Web Design

    • 3110 Words
    • 13 Pages

    WLAN design has come a long way in the last couple of years with fundamental changes and acceptance in terms of the setting of design requirements, goals and methodologies for successful WLAN deployments. Before there were professional and purpose-built tools like AirMagnet Survey for WLAN design and deployment, the entire WLAN design and decision making process was very rough and rudimentary. Most users responsible for WLAN deployment employed a so-called “back-of-a-napkin” technique or did not design the network at all before deployment. This led to improper deployments of the network, which in turn led to wasted time, money, effort, and most importantly, a lack of positive results for the users in terms of connectivity or optimum performance. “Back-of-a-napkin” technique In the “napkin” technique, the user responsible for WLAN design drew the floor map on a piece of paper. In most cases, this map was simply a square or a rectangleshaped box that represented the 4 walls of a building. Next, the designer would mark 4 locations at the corners of the building and 1 in the center representing locations where APs needed to be placed. This design method would then be repeated for every floor. This method has some major shortcomings that must be overcome in order to have a WLAN that provides optimum security, performance and compliance to the user. Shortcomings include: 1. No consideration into the actual capabilities of the AP (channels, media, transmit power, etc.); 2. No consideration into locations where APs could be placed dependent on availability of the power or Ethernet cable drop points; 3. No consideration into coverage bleed-over outside the corporate building, which is a major security risk; 4.…

    • 3110 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    References: [1] The internet engineering task force mobile ad-hoc networking page (MANET). Available from: http://www.ietf.org/html.charters/ manet-charter.html. [2] Taipei-wlan. Available from: http://wlan.taipei-elife.net/english/ main.html. [3] Wireless philadelphia. wirelessphiladelphia.org. Available from: http://www.…

    • 10973 Words
    • 44 Pages
    Powerful Essays