2020
DOI: 10.1002/dac.4193
|View full text |Cite
|
Sign up to set email alerts
|

High performing multimedia transmission approach based on QoS support and admission control over IEEE 802.11e networks

Abstract: Summary Hybrid coordination function controlled channel access (HCCA) is a medium to enhance quality of service (QoS) via the IEEE 802.11e standard. The main limitation of HCAA is that it is only efficient for constant bit rate (CBR) applications. This is due to the nature of its scheduler that allocates transmission opportunities (TXOPs) based on traffic stream (TS) specifications (TSPECs) that are determined during the traffic setup time. Variable bit rate (VBR) traffics used in HCCA have nondeterministic pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
(37 reference statements)
0
3
0
Order By: Relevance
“…A comparative assessment of our proposed approach with several algorithms presented in [12][13][14][28][29][30] will be discussed in this section. In Table 9, the following characteristics were compared and outlined, including: VoIP metric parameters, number of nodes, network architecture, IEEE technology, and simulation model simulation.…”
Section: Comparative Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…A comparative assessment of our proposed approach with several algorithms presented in [12][13][14][28][29][30] will be discussed in this section. In Table 9, the following characteristics were compared and outlined, including: VoIP metric parameters, number of nodes, network architecture, IEEE technology, and simulation model simulation.…”
Section: Comparative Reviewmentioning
confidence: 99%
“…Given the fact that studies like [12,30] have used different nodes, 5-45 and 10 respectively, to incorporate their approach. However, their suggested methods have only been evaluated by using the architecture of the BSS network.…”
Section: Comparative Reviewmentioning
confidence: 99%
“…Security is a significant challenge in network management and the ever-increasing number of individuals connecting to the Internet. The transmission of sensitive information and the desire to ensure this information's confidentiality has become an essential point in establishing computer networks [1][2][3][4][5]. Therefore, it is crucial to provide a stable technical and legal framework that guarantees adequate data protection.…”
Section: Introductionmentioning
confidence: 99%