Improvement of the Handover and Quality of Service on Software Defined Wireless Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 12
Abstract
The Wireless Fidelity (WiFi) is the business name given to the 802.11b and 802.11g IEEE standard by the WiFi Alliance, formerly known as Weca industry with more than 200 member companies dedicated to supporting the growth of wireless LANs. This standard is currently one of the most used standards in the world. The theoretical data rates of 802.11b are 11 Mb/s and 54 Mb/s for 802.11g. This article presents Handover's improvement performance and quality of service (QoS) parameters and they are: end-to-end delay, latency, jitter, lost packets, and Mean Opinion Score (MoS), under networks Wi-Fi with the help of the OMNeT 4.6 ++, by implementation of a new algorithm at the level of the SDN controller that allows handover management without breaking the connection by respecting the priority per class of traffic. The realization of this work is based on the intra-Wi-Fi mobility, that it is adopted by a macro mobility of level 3 and it is MIPv6 as well as it exploited the protocol of Voice over IP that it is SIP, and the implementation of SDN rules on the OpenFlow protocol.
Authors and Affiliations
Fatima Laassiri, Mohamed Moughit, Noureddine Idboufker
Cervical Cancer Prediction through Different Screening Methods using Data Mining
Cervical cancer remains an important reason of deaths worldwide because effective access to cervical screening methods is a big challenge. Data mining techniques including decision tree algorithms are used in biomedical...
Cloud CRM: State-of-the-Art and Security Challenges
Security undoubtedly play the main role of cloud CRM deployment, since the agile firms utilized cloud services in the providers infrastructures to perform acute CRM operations. In this paper researcher emphasis on the cl...
Comparison of Hash Function Algorithms Against Attacks: A Review
Hash functions are considered key components of nearly all cryptographic protocols, as well as of many security applications such as message authentication codes, data integrity, password storage, and random number gener...
A Review of Computation Solutions by Mobile Agents in an Unsafe Environment
Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can p...
Application of the Tabu Search Algorithm to Cryptography
Tabu search is a powerful algorithm that has been applied with great success to many difficult combinatorial problems. In this paper, we have designed and implemented a symmetrical encryption algorithm whose internal str...