Skip to main content
Erschienen in: Wireless Networks 7/2020

23.03.2019

A new algorithm for optimization of quality of service in peer to peer wireless mesh networks

verfasst von: Mehdi Gheisari, Jafar Alzubi, Xiaobo Zhang, Utku Kose, Jose Antonio Marmolejo Saucedo

Erschienen in: Wireless Networks | Ausgabe 7/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, wireless mesh networks are known as important parts of different commercial, scientific, and industrial processes. Their prevalence increases day-by-day and the future of the world is associated with such technologies for better communication. However, the issue of improving quality of service for dealing with more complex and intense flow of data has been always a remarkable research problem, as a result of improved wireless communication systems. In this sense, objective of this study is to provide a new algorithm for contributing to the associated literature. In the study, peer to peer wireless mesh networks and the concept of service quality were examined first and then an approach for improving service quality in such networks has been proposed accordingly. In detail, the proposed an approach allows profiting data transfer capability by data packet and using this information for routing and preventing overcrowd in network nodes and finally, distributing the load over it. When middle nodes overcrowd, they withhold to send control messages of route creating or do that by delay. The proposed approach has been evaluated and the findings revealed that at least 10% of undue delays through network can be prevented while permittivity does not reduce, thanks to the approach. Also energy consumption within network nodes partially increases due to adding table and the search which can be overlooked.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, T., Yang, Q., Tan, K., et al. (2018). DCAP: Improving the capacity of WiFi networks with distributed cooperative access points. IEEE Transactions on Mobile Computing, 17(2), 320–333.CrossRef Wang, T., Yang, Q., Tan, K., et al. (2018). DCAP: Improving the capacity of WiFi networks with distributed cooperative access points. IEEE Transactions on Mobile Computing, 17(2), 320–333.CrossRef
2.
Zurück zum Zitat Chang, N., Rashidzadeh, R., & Ahmadi, M. (2010). Robust indoor positioning using differential Wi-Fi access points. IEEE Transactions on Consumer Electronics, 56(3), 1860–1867.CrossRef Chang, N., Rashidzadeh, R., & Ahmadi, M. (2010). Robust indoor positioning using differential Wi-Fi access points. IEEE Transactions on Consumer Electronics, 56(3), 1860–1867.CrossRef
3.
Zurück zum Zitat Koo, J., & Cha, H. (2011). Localizing WiFi access points using signal strength. IEEE Communications Letters, 15(2), 187–189.CrossRef Koo, J., & Cha, H. (2011). Localizing WiFi access points using signal strength. IEEE Communications Letters, 15(2), 187–189.CrossRef
4.
Zurück zum Zitat Heegard, C., Coffey, J. T., Gummadi, S., Murphy, P. A., Provencio, R., Rossin, E. J., et al. (2001). High performance wireless Ethernet. IEEE Communications Magazine, 39(11), 64–73.CrossRef Heegard, C., Coffey, J. T., Gummadi, S., Murphy, P. A., Provencio, R., Rossin, E. J., et al. (2001). High performance wireless Ethernet. IEEE Communications Magazine, 39(11), 64–73.CrossRef
5.
Zurück zum Zitat Judd, G., & Steenkiste, P. (2002). Fixing 802. 11 access point selection. ACM SIGCOMM Computer Communication Review, 32(3), 31.CrossRef Judd, G., & Steenkiste, P. (2002). Fixing 802. 11 access point selection. ACM SIGCOMM Computer Communication Review, 32(3), 31.CrossRef
6.
Zurück zum Zitat Jones, K., Liu, L. (2007). What where wi: An analysis of millions of wi-fi access points. In Portable information devices, 2007. PORTABLE 07. IEEE international conference on (pp. 1–4). IEEE. Jones, K., Liu, L. (2007). What where wi: An analysis of millions of wi-fi access points. In Portable information devices, 2007. PORTABLE 07. IEEE international conference on (pp. 1–4). IEEE.
7.
Zurück zum Zitat Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47(4), 445–487.CrossRef Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47(4), 445–487.CrossRef
8.
Zurück zum Zitat Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940–965.CrossRef Alotaibi, E., & Mukherjee, B. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940–965.CrossRef
9.
Zurück zum Zitat Hossain, E., & Leung, K. K. (Eds.). (2007). Wireless mesh networks: Architectures and protocols. Berlin: Springer. Hossain, E., & Leung, K. K. (Eds.). (2007). Wireless mesh networks: Architectures and protocols. Berlin: Springer.
10.
Zurück zum Zitat Misra, S., Misra, S. C., & Woungang, I. (Eds.). (2009). Guide to wireless mesh networks (vol. 995). Berlin: Springer. Misra, S., Misra, S. C., & Woungang, I. (Eds.). (2009). Guide to wireless mesh networks (vol. 995). Berlin: Springer.
11.
Zurück zum Zitat Singh, M. (2019). Wireless mesh networks architecture. In Node-to-node approaching in wireless mesh connectivity (pp. 11–14). Springer, Singapore. Singh, M. (2019). Wireless mesh networks architecture. In Node-to-node approaching in wireless mesh connectivity (pp. 11–14). Springer, Singapore.
12.
Zurück zum Zitat Comer, D. E. (2018). The internet book: Everything you need to know about computer networking and how the Internet works. London: Chapman and Hall/CRC.CrossRef Comer, D. E. (2018). The internet book: Everything you need to know about computer networking and how the Internet works. London: Chapman and Hall/CRC.CrossRef
13.
Zurück zum Zitat Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: Current status and future trends. London: CRC Press. Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: Current status and future trends. London: CRC Press.
14.
Zurück zum Zitat Aggelou, G. (2008). Wireless mesh networking. New York: McGraw-Hill Professional. Aggelou, G. (2008). Wireless mesh networking. New York: McGraw-Hill Professional.
15.
Zurück zum Zitat Held, G. (2005). Wireless mesh networks. Philadelphia, PA: Auerbach Publications.CrossRef Held, G. (2005). Wireless mesh networks. Philadelphia, PA: Auerbach Publications.CrossRef
16.
Zurück zum Zitat Crow, B. P., Widjaja, I., Kim, J. G., & Sakai, P. T. (1997). IEEE 802.11 wireless local area networks. IEEE Communications Magazine, 35(9), 116–126.CrossRef Crow, B. P., Widjaja, I., Kim, J. G., & Sakai, P. T. (1997). IEEE 802.11 wireless local area networks. IEEE Communications Magazine, 35(9), 116–126.CrossRef
17.
Zurück zum Zitat Cali, F., Conti, M., & Gregori, E. (1998). IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement. In INFOCOM’98. Seventeenth annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE (vol. 1, pp. 142–149). IEEE. Cali, F., Conti, M., & Gregori, E. (1998). IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement. In INFOCOM’98. Seventeenth annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE (vol. 1, pp. 142–149). IEEE.
18.
Zurück zum Zitat O’hara, B., & Petrick, A. (2005). IEEE 802.11 handbook: A designer’s companion. IEEE Standards Association. O’hara, B., & Petrick, A. (2005). IEEE 802.11 handbook: A designer’s companion. IEEE Standards Association.
19.
Zurück zum Zitat Xiao, Y., & Rosdahl, J. (2002). Throughput and delay limits of IEEE 802.11. IEEE Communications Letters, 6(8), 355–357.CrossRef Xiao, Y., & Rosdahl, J. (2002). Throughput and delay limits of IEEE 802.11. IEEE Communications Letters, 6(8), 355–357.CrossRef
20.
Zurück zum Zitat Kumar, K. A., & Balakrishna, R. (2017). Comparative analysis of delay and throughput using IEEE 802.11 and receiver centric-MAC protocol in wireless sensor networks. In Power and advanced computing technologies (i-PACT), 2017 Innovations in (pp. 1–5). IEEE. Kumar, K. A., & Balakrishna, R. (2017). Comparative analysis of delay and throughput using IEEE 802.11 and receiver centric-MAC protocol in wireless sensor networks. In Power and advanced computing technologies (i-PACT), 2017 Innovations in (pp. 1–5). IEEE.
21.
Zurück zum Zitat Goode, B. (2002). Voice over internet protocol (VoIP). Proceedings of the IEEE, 90(9), 1495–1517.CrossRef Goode, B. (2002). Voice over internet protocol (VoIP). Proceedings of the IEEE, 90(9), 1495–1517.CrossRef
22.
Zurück zum Zitat Ahson, S. A., & Ilyas, M. (Eds.). (2008). VoIP handbook: Applications, technologies, reliability, and security. London: CRC Press. Ahson, S. A., & Ilyas, M. (Eds.). (2008). VoIP handbook: Applications, technologies, reliability, and security. London: CRC Press.
23.
Zurück zum Zitat Ganguly, S., & Bhatnagar, S. (2008). VoIP: Wireless, P2P and new enterprise voice over IP. London: Wiley.CrossRef Ganguly, S., & Bhatnagar, S. (2008). VoIP: Wireless, P2P and new enterprise voice over IP. London: Wiley.CrossRef
24.
Zurück zum Zitat Geer, D. (2009). The future of mobile VoIP in the enterprise. Computer, 42(6), 15–18.CrossRef Geer, D. (2009). The future of mobile VoIP in the enterprise. Computer, 42(6), 15–18.CrossRef
25.
Zurück zum Zitat Kaushal, S., Kumar, H., Singh, S., Aggarwal, S., Kaur, J., & Vaidyanathan, S. (2018). Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network. International Journal of Simulation and Process Modelling, 13(1), 35–42.CrossRef Kaushal, S., Kumar, H., Singh, S., Aggarwal, S., Kaur, J., & Vaidyanathan, S. (2018). Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network. International Journal of Simulation and Process Modelling, 13(1), 35–42.CrossRef
26.
Zurück zum Zitat Jiang, Y., & Tang, S. (2017). An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24(3). Jiang, Y., & Tang, S. (2017). An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24(3).
28.
Zurück zum Zitat Chu, C. Y., Chen, S., Yen, Y. C., Yeh, S. L., Chu, H. H., & Huang, P. (2018). EQ: A QoE-centric rate control mechanism for VoIP calls. ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 3(1), 4. Chu, C. Y., Chen, S., Yen, Y. C., Yeh, S. L., Chu, H. H., & Huang, P. (2018). EQ: A QoE-centric rate control mechanism for VoIP calls. ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 3(1), 4.
29.
Zurück zum Zitat Harkat, Y., & Amrouche, A. (2012). A comparative evaluation of VoWLAN call capacity with and without codec’s silence suppression. In Microelectronics (ICM), 2012 24th International Conference on (pp. 1–4). IEEE. Harkat, Y., & Amrouche, A. (2012). A comparative evaluation of VoWLAN call capacity with and without codec’s silence suppression. In Microelectronics (ICM), 2012 24th International Conference on (pp. 1–4). IEEE.
30.
Zurück zum Zitat Ulseth, T., & Engelstad, P. (2006). Voice over WLAN (VoWLAN): A wireless voice alternative. TELEKTRONIKK, 102(1), 82. Ulseth, T., & Engelstad, P. (2006). Voice over WLAN (VoWLAN): A wireless voice alternative. TELEKTRONIKK, 102(1), 82.
31.
Zurück zum Zitat Badia, L., Merlin, S., Zanella, A., & Zorzi, M. (2006). Pricing VoWLAN services through a micro-economic framework. IEEE Wireless Communications, 13(1), 6–13.CrossRef Badia, L., Merlin, S., Zanella, A., & Zorzi, M. (2006). Pricing VoWLAN services through a micro-economic framework. IEEE Wireless Communications, 13(1), 6–13.CrossRef
32.
Zurück zum Zitat Ghaderzadeh, A., Kargahi, M., & Reshadi, M. (2018). ReDePoly: Reducing delays in multi-channel P2P live streaming systems using distributed intelligence. Telecommunication Systems, 67(2), 231–246.CrossRef Ghaderzadeh, A., Kargahi, M., & Reshadi, M. (2018). ReDePoly: Reducing delays in multi-channel P2P live streaming systems using distributed intelligence. Telecommunication Systems, 67(2), 231–246.CrossRef
33.
Zurück zum Zitat Merani, M. L., & Natali, L. (2016). Adaptive streaming in P2P live video systems: A distributed rate control approach. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 12(3), 46. Merani, M. L., & Natali, L. (2016). Adaptive streaming in P2P live video systems: A distributed rate control approach. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 12(3), 46.
34.
Zurück zum Zitat Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In ACM SIGCOMM computer communication review (vol. 34, no. 4, pp. 367–378). ACM. Qiu, D., & Srikant, R. (2004). Modeling and performance analysis of BitTorrent-like peer-to-peer networks. In ACM SIGCOMM computer communication review (vol. 34, no. 4, pp. 367–378). ACM.
35.
Zurück zum Zitat Lan, H. B. T., & Nguyen, H. S. (2011). A low-delay push-pull based application layer multicast for p2p live video streaming. In 2011 Third international conference on knowledge and systems engineering (pp. 104–111). IEEE. Lan, H. B. T., & Nguyen, H. S. (2011). A low-delay push-pull based application layer multicast for p2p live video streaming. In 2011 Third international conference on knowledge and systems engineering (pp. 104–111). IEEE.
36.
Zurück zum Zitat Narkdej, K., Choochaisri, S., & Intanagonwiwat, C. (2011). A reinforcement-based push-pull approach for peer-to-peer live streaming. In Wireless communications, networking and mobile computing (WiCOM), 2011 7th international conference on (pp. 1–4). IEEE. Narkdej, K., Choochaisri, S., & Intanagonwiwat, C. (2011). A reinforcement-based push-pull approach for peer-to-peer live streaming. In Wireless communications, networking and mobile computing (WiCOM), 2011 7th international conference on (pp. 1–4). IEEE.
37.
Zurück zum Zitat Brogle, M., Milic, D., Bettosini, L., & Braun, T. (2009). A performance comparison of native IP Multicast and IP Multicast tunneled through a Peer-to-Peer overlay network. In Ultra modern telecommunications and workshops, 2009. ICUMT’09. International conference on (pp. 1–6). IEEE. Brogle, M., Milic, D., Bettosini, L., & Braun, T. (2009). A performance comparison of native IP Multicast and IP Multicast tunneled through a Peer-to-Peer overlay network. In Ultra modern telecommunications and workshops, 2009. ICUMT’09. International conference on (pp. 1–6). IEEE.
38.
Zurück zum Zitat Ferreira, F. H., da Silva, A. P. C., & Vieira, A. B. (2016). Characterizing peers communities and dynamics in a P2P live streaming system. Peer-to-Peer Networking and Applications, 9(1), 1–15.CrossRef Ferreira, F. H., da Silva, A. P. C., & Vieira, A. B. (2016). Characterizing peers communities and dynamics in a P2P live streaming system. Peer-to-Peer Networking and Applications, 9(1), 1–15.CrossRef
39.
Zurück zum Zitat Pal, K., Govil, M. C., & Ahmed, M. (2019). Utilization-based hybrid overlay for live video streaming in P2P network. In Recent findings in intelligent computing techniques (pp. 331–338). Springer, Singapore. Pal, K., Govil, M. C., & Ahmed, M. (2019). Utilization-based hybrid overlay for live video streaming in P2P network. In Recent findings in intelligent computing techniques (pp. 331–338). Springer, Singapore.
40.
Zurück zum Zitat Al-Maqri, M. A., Alrshah, M. A., & Othman, M. (2018). Review on QoS provisioning approaches for supporting video traffic in IEEE802. 11e: Challenges and issues. IEEE Access, 6, 55202–55219.CrossRef Al-Maqri, M. A., Alrshah, M. A., & Othman, M. (2018). Review on QoS provisioning approaches for supporting video traffic in IEEE802. 11e: Challenges and issues. IEEE Access, 6, 55202–55219.CrossRef
41.
Zurück zum Zitat Felber, P., Kermarrec, A. M., Leonini, L., Riviere, E., & Voulgaris, S. (2012). PULP: An adaptive gossip-based dissemination protocol for multi-source message streams. Peer-to-Peer Networking and Applications, 5(1), 74–91.CrossRef Felber, P., Kermarrec, A. M., Leonini, L., Riviere, E., & Voulgaris, S. (2012). PULP: An adaptive gossip-based dissemination protocol for multi-source message streams. Peer-to-Peer Networking and Applications, 5(1), 74–91.CrossRef
42.
Zurück zum Zitat Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561.
43.
Zurück zum Zitat Perkins, C. E. (2001). Ad hoc networking (Vol. 1). Reading: Addison-Wesley. Perkins, C. E. (2001). Ad hoc networking (Vol. 1). Reading: Addison-Wesley.
44.
Zurück zum Zitat Muhammad, A. R. I. F., Guojun, W. A. N. G., & Valentina, Emilia B. A. L. A. S. (2018). Secure VANETs: Trusted communication scheme between vehicles and infrastructure based on fog computing. Studies in Informatics and Control, 27(2), 235–246. Muhammad, A. R. I. F., Guojun, W. A. N. G., & Valentina, Emilia B. A. L. A. S. (2018). Secure VANETs: Trusted communication scheme between vehicles and infrastructure based on fog computing. Studies in Informatics and Control, 27(2), 235–246.
45.
Zurück zum Zitat Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef Royer, E. M., & Toh, C. K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55.CrossRef
46.
Zurück zum Zitat Gheisari, M., et al. (2017). MAPP: A modular arithmetic algorithm for privacy preserving in IoT. In Ubiquitous computing and communications (ISPA/IUCC), 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on. IEEE. Gheisari, M., et al. (2017). MAPP: A modular arithmetic algorithm for privacy preserving in IoT. In Ubiquitous computing and communications (ISPA/IUCC), 2017 IEEE international symposium on parallel and distributed processing with applications and 2017 IEEE international conference on. IEEE.
47.
Zurück zum Zitat Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef
48.
Zurück zum Zitat AL-Dhief, F. T., Sabri, N., Salim, M. S., Fouad, S., & Aljunid, S. A. (2018). MANET routing protocols evaluation: AODV, DSR and DSDV perspective. In MATEC web of conferences (vol. 150, p. 06024). EDP Sciences. AL-Dhief, F. T., Sabri, N., Salim, M. S., Fouad, S., & Aljunid, S. A. (2018). MANET routing protocols evaluation: AODV, DSR and DSDV perspective. In MATEC web of conferences (vol. 150, p. 06024). EDP Sciences.
49.
Zurück zum Zitat Tseng, C. Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., & Levitt, K. (2003). A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks (pp. 125–134). ACM. Tseng, C. Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., & Levitt, K. (2003). A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks (pp. 125–134). ACM.
50.
Zurück zum Zitat Ade, S. A., & Tijare, P. A. (2010). Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. International Journal of Information Technology and Knowledge Management, 2(2), 545–548. Ade, S. A., & Tijare, P. A. (2010). Performance comparison of AODV, DSDV, OLSR and DSR routing protocols in mobile ad hoc networks. International Journal of Information Technology and Knowledge Management, 2(2), 545–548.
51.
Zurück zum Zitat Cai, S., Bao, G., Ma, X., Wu, W., Bian, G., Rodrigues, J. J., & de Albuquerque, V. H. C. (2019). Parameters optimization of the dust absorbing structure for photovoltaic panel cleaning robot based on orthogonal experiment method. Journal of Cleaner Production. Cai, S., Bao, G., Ma, X., Wu, W., Bian, G., Rodrigues, J. J., & de Albuquerque, V. H. C. (2019). Parameters optimization of the dust absorbing structure for photovoltaic panel cleaning robot based on orthogonal experiment method. Journal of Cleaner Production.
52.
Zurück zum Zitat Casas-Ramírez, M. S., & Camacho-Vallejo, J. F. (2017). Solving the p-median bilevel problem with order through a hybrid heuristic. Applied Soft Computing, 60, 73–86.CrossRef Casas-Ramírez, M. S., & Camacho-Vallejo, J. F. (2017). Solving the p-median bilevel problem with order through a hybrid heuristic. Applied Soft Computing, 60, 73–86.CrossRef
53.
Zurück zum Zitat Kabalci, Y. (2018). An improved approximation for the Nakagami-m inverse CDF using artificial bee colony optimization. Wireless Networks, 24(2), 663–669.CrossRef Kabalci, Y. (2018). An improved approximation for the Nakagami-m inverse CDF using artificial bee colony optimization. Wireless Networks, 24(2), 663–669.CrossRef
54.
Zurück zum Zitat Torres-Escobar, R., Marmolejo-Saucedo, J. A., & Litvinchev, I. (2018). Binary monkey algorithm for approximate packing non-congruent circles in a rectangular container. Wireless Networks, 1–10. Torres-Escobar, R., Marmolejo-Saucedo, J. A., & Litvinchev, I. (2018). Binary monkey algorithm for approximate packing non-congruent circles in a rectangular container. Wireless Networks, 1–10.
55.
Zurück zum Zitat George, R., & Hemanth, J. (2011). Application of an optimization algorithm for channel assignment in mobile communication. In IJCA special issue on “novel aspects of digital imaging applications” DIA, 29–35. George, R., & Hemanth, J. (2011). Application of an optimization algorithm for channel assignment in mobile communication. In IJCA special issue on “novel aspects of digital imaging applications” DIA, 29–35.
56.
Zurück zum Zitat Hildmann, H., Atia, D. Y., Ruta, D., Khrais, S. S., & Isakovic, A. F. (2019). A model for wireless-access network topology and a PSO-based approach for its optimization. In Recent advances in computational optimization (pp. 87–116). Springer, Cham. Hildmann, H., Atia, D. Y., Ruta, D., Khrais, S. S., & Isakovic, A. F. (2019). A model for wireless-access network topology and a PSO-based approach for its optimization. In Recent advances in computational optimization (pp. 87–116). Springer, Cham.
Metadaten
Titel
A new algorithm for optimization of quality of service in peer to peer wireless mesh networks
verfasst von
Mehdi Gheisari
Jafar Alzubi
Xiaobo Zhang
Utku Kose
Jose Antonio Marmolejo Saucedo
Publikationsdatum
23.03.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01982-z

Weitere Artikel der Ausgabe 7/2020

Wireless Networks 7/2020 Zur Ausgabe

Neuer Inhalt