Performance Evaluation of IEEE 802.11b/n in Wireless Networks for QoS Improvement
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 10
Abstract
The development of technology in the wireless communication domain has enhanced the need for power optimization schemes, because the battery technology has not kept up pace with the ever increasing growth of mobile devices. Power consumption can be reduced by decreasing the transmit power to a minimal optimum level, such that the packets are received correctly. This paper compares IEEE 802.11b and IEEE 802.11n wireless networks and shows that optimization of power control, increases the life of the battery and maybe achieved by the implementation of IEEE 802.11n. The paper studies the power consumption as against the transmit power and also shows the effect of co-channel interference. Elements of network performance include throughput, delay, bandwidth and channel utilization. The result compares IEEE802.11n with IEEE802.11b in terms of power consumption. The results show an improvement in performance of the wireless network using IEEE 802.11n.
Authors and Affiliations
D. Sylvia , Dr. B. Jothi Mohan , Dr. D. Srinivasa Rao
Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless Regional Area Network
With the technological advancement in wireless applications more effective and efficient utilization of the available spectrum became the urgent requirement. According to the IEEE 802.22 standard the unlicensed secondary...
Analytical Simulation and Performance Optimization for Spectrum Sensing in Cognitive Radio Networks
Dynamic spectrum allocation (DSA) solutions such as cognitive radio networks (CRNs) have been proposed as a key technology to exploit the frequency segments that are spectrally underutilized. In this paper, the performan...
Printed and Handwritten Mixed Kannada Numerals Recognition Using SVM
A mixer of printed and handwritten numerals may appear in a single document such as application forms, postal mail, and official documents. The process of identifying of such mixed numerals and sending it to respective O...
A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transfor...
Canonical Correlated Kernel PCA Method for Face Recognition
Practical face recognition systems are sometimes confronted with low-resolution face images. To address this problem, a super-resolution method that uses nonlinear mappings to infer coherent features that favor higher re...