A Novel Scheduler Framework for 802.11ac
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 8
Abstract
Due to the unpredictable nature of the CSMA/CA media access mechanism in WLANs and also, as WLANS operate in the unlicensed band, assuring time bound guarantees for multimedia applications has always been a challenge. Although schedulers have been proposed for WLANs, they have not met with the success witnessed in cellular networks. In this paper, we study the features introduced in IEEE 802.11ac WLANs and investigate if schedulers can be recommended for these wireless networks.
Authors and Affiliations
NS Ravindranath, Inder Singh, Ajay Prasad, V. Sambasiva Rao
Optimization of Forming Process Parameters in Sheet Metal Forming Of Reinf-Rr End Upr-Lh/Rh for Safe Thinning
During the forming process of sheet metal component i.e., REINF-RR END UPR-LH/RH, defects such as wrinkle and thinning is observed. These defects can be reduced by varying the process parameters by trial and error method...
Design, Construction and Experiment on Imbert Downdraft Gasifier Using South Sumatera Biomass and Low Rank Coal as Fuel
The solid fuel must be converted to gas fuel or liquid fuel for application to internal combustion engine or gas turbine. Gasification is a technology to convert solid fuel into combustible gas. Gasification system gener...
Multifunction Intelligent Headset
Personal sound systems have become an overwhelming trend of today’s lifestyle. Headsets have been developing throughout the years focusing on improving sound quality. The risks involved in using headsets especially on ro...
Experimental Investigation of Emission Characteristic of Tert Butyl Alcohol and Gasoline Blend Using Two Stroke Si Engine
Internal combustion engine are the mostpreferred prime mover across the world. Spark ignition engine is preferred locomotive prime mover due to its smooth operation and low maintains. The gasoline is fossil fuel which is...
Hybridizing Regular Expression with query processing to remove SQL Injection and XSS attacks
Web applications are widely used everywhere like e-commerce, online payments, online banking, money transfer, social networking, etc. As web application interacts with database where critical information is stored over t...