TITLE

Understanding QoS issues for 802.11

PUB. DATE
March 2004
SOURCE
Portable Design;Mar2004, Vol. 10 Issue 3, p18
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article discusses why the 802.11 wireless technology standard must adopt quality of service (QoS) principles. As traffic loads increase on a wireless local area network, high-priority and real time links lose reliability because nodes contend with each other to determine which one will get to transmit. The QoS is essential for enabling the widespread deployment of wireless multimedia applications. Implementing QoS can create issues, but fortunately there are several ways to address those issues that do not require modifications to the 802.11 standards. A simple and extensive approach is to overprovision bandwidth. Another more basic approach is to queue traffic in the host, place all QoS traffic in a high-priority queue, and separate it from low-priority data.
ACCESSION #
12514529

 

Related Articles

  • Research on the Frame Traffic of Wireless Local Area Network. Ge Xiaohu; Zhu Yaoting // Information Technology Journal;2007, Vol. 6 Issue 4, p593 

    Because the channel of wireless LAN is more complex than that of wired LAN, the traffic running in the channel is the key of estimation of behavior model in the wireless LAN. We have compared the IP packet traffic and MAC frame traffic and analyzed the difference between these two traffics and...

  • Above and beyond quality of service.  // Portable Design;Mar2004, Vol. 10 Issue 3, p17 

    This article focuses on the additional features of the 802.11 wireless technology standard. The Block ACK is the simplest of the three features discussed in this article. Each data transfer is separated by a short interframe space period, further improving throughput of the wireless local area...

  • Beware the silence of a good idea. Clark, Robert // Wireless Asia;Nov2004, Vol. 7 Issue 9, p6 

    No abstract available.

  • The 802.11g reality drives 802.11a's future dominance.  // Portable Design;Mar2004, Vol. 10 Issue 3, p24 

    This article argues that the 802.11a-based wireless technology solutions will dominate developments pertaining to the use of the wireless local area network, due to the increased need to deliver greater network capacity and performance than that offered by the 802.11g standard. The increasing...

  • CogNS: A Simulation Framework for Cognitive Radio Networks. Esmaeelzadeh, Vahid; Berangi, Reza; Sebt, Seyyed; Hosseini, Elahe; Parsinia, Moein // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2849 

    Cognitive radio technology has been used to efficiently utilize the spectrum in wireless networks. Although many research studies have been done recently in the area of cognitive radio networks (CRNs), little effort has been made to propose a simulation framework for CRNs. In this paper, a...

  • Strategies for deploying Wi-Fi. Abramowitz, Jeff // Communications News;Apr2004, Vol. 41 Issue 4, p40 

    This article discusses several strategies for deploying wireless fidelity (Wi-Fi) technology. The 802.11b wireless local area network (LAN) standard offers maximum range up to 11 Mbps, more than enough bandwidth for single-client users. The bandwidth of a wireless network is shared, however,...

  • Unsecured Wi-Fi access points a concern. Mohney, Doug // Mobile Radio Technology;Jan2005, Vol. 23 Issue 1, p30 

    This article focuses on Wi-Fi access to monitor airwaves for rogue wireless LAN users. According to security companies, federal regulations such as the HIPPA health care privacy act and Sarbanes-Oxley financial reporting requirements have pushed publicly owned the box security standards such as...

  • Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks. Yun, Ji-Hoon; Park, Min-Ho // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2519 

    There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a...

  • The LWAPP flap. Vance, Jeff // Network World;1/5/2004, Vol. 21 Issue 1, p35 

    Focuses on the increase in the number of wireless LAN (WLAN) switch vendors in the U.S. supporting Lightweight Access Point Protocol (LWAPP), a standard that would create interoperability between thin access points and WLAN switches from different vendors. Network activities defined by LWAPP;...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics