Skip to main content
Top
Published in: Wireless Networks 5/2023

14-03-2023 | Original Paper

Increasing quality of service in wireless local area networks through fuzzy logic based feedback control method

Authors: Hacı Bayram Karakurt, Cemal Koçak

Published in: Wireless Networks | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In many studies aimed at improving the quality of service (QoS) in wireless local area networks (WLAN), the performance was improved by applying non-ACK model, physical interference model, analytical models etc. with using optimization algorithms with stable simulations. For efficient QoS in WLANs, performance is generally increased using 802.11n medium access control protocol through request to send threshold value (RSTV), fragmentation threshold value (FTV) and buffer size (BS) parameters. While the RSTV activates the request to send/clear to send (RTS/CTS) mechanism in carrier sense multiple access with collision avoidance (CSMA/CA) protocol, FTV fragments the larger packets during CSMA/CA transmission, reducing the packet loss in WLANs. BS, however, is the memory used in the CSMA/CA model to reduce cost. In previous studies, most of the new model applied in process layers by using Riverbed Modeler simulation tool and ideal input values had been obtained for RSTV, FTV and BS during the simulation stable. In this study, a new model proposed for CSMA/CA protocol on the process layers which used feedback controlled method with fuzzy logic to improve QoS during the simulation. Values obtained with nearly six million different test results, has been revealed that throughput was increased by 26.48%, the channel utilization by 2.30%, the data traffic received by 14.59% and the data traffic sent by 17.06% respectively. While RSTV, FTV and BS input parameters are optimized with the help of the feedback controlled algorithm used in these studies, the effects of external parameters such as number of nodes, inter-arrival time, transmitting power etc. on the performance improvements in the model are demonstrated in graphics. All these test results have shown that the new model provides a high rate of performance improvement for WLANs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Singh, H., Singh, T., & Kaur, M. (2014). Improving the quality of service of EDCF over DCF for real time applications using probability algorithm. IJARCCE, 3–4, 6330–6333. Singh, H., Singh, T., & Kaur, M. (2014). Improving the quality of service of EDCF over DCF for real time applications using probability algorithm. IJARCCE, 3–4, 6330–6333.
2.
go back to reference Dalvi, A., Svamy, P., & Meshram, B.B. (2011). DCF improvement for satisfactory throughput of 802.11 WLAN, IJCSE, 3–7 (pp. 2862–2868). Dalvi, A., Svamy, P., & Meshram, B.B. (2011). DCF improvement for satisfactory throughput of 802.11 WLAN, IJCSE, 3–7 (pp. 2862–2868).
3.
go back to reference Borsuk, B., & Koçak, C. (2016). RTS/CTS mechanism’s effect on performance in multimedia applications when hidden node problem occurs on wireless networks. International Journal Of Informatics Technologies, 9–2, 187–195. Borsuk, B., & Koçak, C. (2016). RTS/CTS mechanism’s effect on performance in multimedia applications when hidden node problem occurs on wireless networks. International Journal Of Informatics Technologies, 9–2, 187–195.
4.
go back to reference Yun, J.H., & Seo, S.W. (2007). Novel collision detection scheme and its applications for IEEE 802.11 wireless LANs. Computer Communication, 30, 1350–1366. Yun, J.H., & Seo, S.W. (2007). Novel collision detection scheme and its applications for IEEE 802.11 wireless LANs. Computer Communication, 30, 1350–1366.
5.
go back to reference Kocak, C., & Karakurt, H. B. (2019). Fuzzy logic-based performance improvement on MAC layer in wireless local area networks. Neural Computing and Applications, 31, 6113–6128.CrossRef Kocak, C., & Karakurt, H. B. (2019). Fuzzy logic-based performance improvement on MAC layer in wireless local area networks. Neural Computing and Applications, 31, 6113–6128.CrossRef
6.
go back to reference Kocak, C., & Karakurt, H. B. (2019). Data traffic optimization in wireless local area networks with artificial neural networks. Journal Of Polytechnic, 22–3, 737–747. Kocak, C., & Karakurt, H. B. (2019). Data traffic optimization in wireless local area networks with artificial neural networks. Journal Of Polytechnic, 22–3, 737–747.
7.
go back to reference Malik, S., Chaudhary, R., Pathak, A., Chakraborty, S.P. (2015). Modeling and analysis of IEEE 802.11 DCF MAC. In 3rd international conference on recent trends in computing. Procedia computer science (Vol. 57, pp. 473–482). Malik, S., Chaudhary, R., Pathak, A., Chakraborty, S.P. (2015). Modeling and analysis of IEEE 802.11 DCF MAC. In 3rd international conference on recent trends in computing. Procedia computer science (Vol. 57, pp. 473–482).
9.
go back to reference Kaur, I., Bala, M., & Bajaj, H. (2012). Performance evaluation of WLAN by varying PCF, DCF and enhanced DCF slots to improve quality of service. IOSRJCE, 2–5, 29–33.CrossRef Kaur, I., Bala, M., & Bajaj, H. (2012). Performance evaluation of WLAN by varying PCF, DCF and enhanced DCF slots to improve quality of service. IOSRJCE, 2–5, 29–33.CrossRef
10.
go back to reference Karakurt, H. B., & Kocak, C. (2015). On wireless network PCF, DCF and EDCF with fragmentation threshold. In XVII. Academic Informatics Conference Eskisehir/Turkey Karakurt, H. B., & Kocak, C. (2015). On wireless network PCF, DCF and EDCF with fragmentation threshold. In XVII. Academic Informatics Conference Eskisehir/Turkey
11.
go back to reference Sidelnikov, A., Yu, J., & Choi, S. (2006). Fragmentation/Aggregation scheme for throughput enhancement of IEEE 802.11n WLAN. In Proceedings of IEEE APWCS. Sidelnikov, A., Yu, J., & Choi, S. (2006). Fragmentation/Aggregation scheme for throughput enhancement of IEEE 802.11n WLAN. In Proceedings of IEEE APWCS.
12.
go back to reference Preveze, B. (2011). Cognitive methods in multimedia communications. Dissertation, University of Baskent Preveze, B. (2011). Cognitive methods in multimedia communications. Dissertation, University of Baskent
13.
go back to reference Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network. Ad Hoc Networks, 97, 1–14.CrossRef Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network. Ad Hoc Networks, 97, 1–14.CrossRef
14.
go back to reference Poornima, G. A., & Paramasivan, B. (2020). Anomaly detection in wireless sensor network using machine learning algorithm. Computer Communications, 151, 331–337. Poornima, G. A., & Paramasivan, B. (2020). Anomaly detection in wireless sensor network using machine learning algorithm. Computer Communications, 151, 331–337.
15.
go back to reference Fanian, F., & Rafsanjani, M. K. (2020). A new fuzzy multi-hop clustering protocol with automatic rule tuning for wireless sensor networks. Applied Soft Computing, 89, 1–24.CrossRef Fanian, F., & Rafsanjani, M. K. (2020). A new fuzzy multi-hop clustering protocol with automatic rule tuning for wireless sensor networks. Applied Soft Computing, 89, 1–24.CrossRef
16.
go back to reference Zhao, X. W., Hai, L. X., & Wei, D. (2008). A fuzzy logic cooperative MAC for MANET. The Journal Of China Universities Of Posts And Telecommunications, 15–1, 55–60. Zhao, X. W., Hai, L. X., & Wei, D. (2008). A fuzzy logic cooperative MAC for MANET. The Journal Of China Universities Of Posts And Telecommunications, 15–1, 55–60.
17.
go back to reference Frantti, T., & Koivula, M. (2011). Fuzzy packet size control for delay sensitive traffic in ad hoc networks. Expert Systems with Applications, 38, 10188–10198.CrossRef Frantti, T., & Koivula, M. (2011). Fuzzy packet size control for delay sensitive traffic in ad hoc networks. Expert Systems with Applications, 38, 10188–10198.CrossRef
18.
go back to reference Collotta, M. (2015). FLBA: A fuzzy algorithm for load balancing in IEEE 802.11 network. Journal of Network and Computer Applications 53, 183–192. Collotta, M. (2015). FLBA: A fuzzy algorithm for load balancing in IEEE 802.11 network. Journal of Network and Computer Applications 53, 183–192.
19.
go back to reference Yu, Y., Wang, T., & Liew, C. (2018). Deep-reinforcement learning multiple access for heterogeneous wireless networks. IEEE Journal On Selected Areas In Communications, 37–6, 1277–1290. Yu, Y., Wang, T., & Liew, C. (2018). Deep-reinforcement learning multiple access for heterogeneous wireless networks. IEEE Journal On Selected Areas In Communications, 37–6, 1277–1290.
20.
go back to reference Bhattacharyya, R., Bura, A., Rengarajan, D., Rumuly, M., Shakkottai, S., Kalathil, D., Mok, R. K. P., Dhamdhere, A. (2019). QFlow: A reinforcement learning approach to high QoE video streaming over wireless networks. In ’19 Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing (pp. 251–260). Bhattacharyya, R., Bura, A., Rengarajan, D., Rumuly, M., Shakkottai, S., Kalathil, D., Mok, R. K. P., Dhamdhere, A. (2019). QFlow: A reinforcement learning approach to high QoE video streaming over wireless networks. In ’19 Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing (pp. 251–260).
21.
go back to reference Yang, J., You, X., Wu, G., Hassan, M. M., Almogren, A., & Guna, J. (2019). Application of reinforcement learning in UAV cluster task scheduling. Future Generation Computer Systems, 95, 140–148.CrossRef Yang, J., You, X., Wu, G., Hassan, M. M., Almogren, A., & Guna, J. (2019). Application of reinforcement learning in UAV cluster task scheduling. Future Generation Computer Systems, 95, 140–148.CrossRef
22.
go back to reference Li, F., Chen, Y., Wang, J., Zhou, X., & Tang, B. (2019). A reinforcement learning unit matching recurrent neural network for the state trend prediction of rolling bearings. Measurement, 145, 191–203.CrossRef Li, F., Chen, Y., Wang, J., Zhou, X., & Tang, B. (2019). A reinforcement learning unit matching recurrent neural network for the state trend prediction of rolling bearings. Measurement, 145, 191–203.CrossRef
23.
go back to reference You, C., Lu, J., Filev, D., & Tsiotras, P. (2019) Advanced planning for autonomous vehicles using reinforcement learning and deep inverse reinforcement learning. Robotics and Autonomous Systems, 114, 1–18. You, C., Lu, J., Filev, D., & Tsiotras, P. (2019) Advanced planning for autonomous vehicles using reinforcement learning and deep inverse reinforcement learning. Robotics and Autonomous Systems, 114, 1–18.
24.
go back to reference Yao, H., Chen, X., Li, M., Zhang, P., & Wang, L. (2018). A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing, 284, 1–19.CrossRef Yao, H., Chen, X., Li, M., Zhang, P., & Wang, L. (2018). A novel reinforcement learning algorithm for virtual network embedding. Neurocomputing, 284, 1–19.CrossRef
25.
go back to reference Bandırmalı, N., Ertürk, İ., Çeken, C., & ve Bayılmış, C. (2008). Providing security service with skipjack encryption method for delay sensitive and energy aware wireless sensor networks. In Electrical and electronics and computer engineering symposium, ELECO’08 (pp. 152–157). Bandırmalı, N., Ertürk, İ., Çeken, C., & ve Bayılmış, C. (2008). Providing security service with skipjack encryption method for delay sensitive and energy aware wireless sensor networks. In Electrical and electronics and computer engineering symposium, ELECO’08 (pp. 152–157).
26.
go back to reference Gamal, M., Sadek, N., Rizk, M. R. M., & Ahmed, M. A. E. (2020). Optimization and modeling of modified unslotted CSMA/CA for wireless sensor networks. Alexandria Engineering Journal, 59, 681–691.CrossRef Gamal, M., Sadek, N., Rizk, M. R. M., & Ahmed, M. A. E. (2020). Optimization and modeling of modified unslotted CSMA/CA for wireless sensor networks. Alexandria Engineering Journal, 59, 681–691.CrossRef
27.
go back to reference Mawlawi, B., Dore, J. B., Lebedev, N., & Gorce, J. M. (2014). Performance evaluation of multiband CSMA/CA with RTS/CTS for M2M communication with finite retransmission strategy. Procedia Computer Science, 40, 108–115.CrossRef Mawlawi, B., Dore, J. B., Lebedev, N., & Gorce, J. M. (2014). Performance evaluation of multiband CSMA/CA with RTS/CTS for M2M communication with finite retransmission strategy. Procedia Computer Science, 40, 108–115.CrossRef
28.
go back to reference Mahmood, D., Khan, Z. A., Qasim, U., Naru, M. U., Mukhtar, S., Akram, M. I., & Javaid, N. (2014). Analyzing and evaluating contention access period of slotted CSMA/CA for IEEE802.15.4. Procedia Computer Science, 34, 204–115. Mahmood, D., Khan, Z. A., Qasim, U., Naru, M. U., Mukhtar, S., Akram, M. I., & Javaid, N. (2014). Analyzing and evaluating contention access period of slotted CSMA/CA for IEEE802.15.4. Procedia Computer Science, 34, 204–115.
29.
go back to reference Uddin, M. F. (2021). Downlink performance analysis of a CSMA based WLAN under physical interference model. Computer Networks, 196(108255), 1–18. Uddin, M. F. (2021). Downlink performance analysis of a CSMA based WLAN under physical interference model. Computer Networks, 196(108255), 1–18.
30.
go back to reference Touijer, B., Maissa, Y. B., & Mouline, S. (2021). IEEE 802.15.6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure. Computer Networks, 188, 107759 pp. 1–17. Touijer, B., Maissa, Y. B., & Mouline, S. (2021). IEEE 802.15.6 CSMA/CA access method for WBANs: Performance evaluation and new backoff counter selection procedure. Computer Networks, 188, 107759 pp. 1–17.
31.
go back to reference Karakurt, H. B., & Kocak, C. (2015). Performance improvement with fragmentation threshold for the co-ordination functions by using wireless local area. Dissertation, University of Gazi. Karakurt, H. B., & Kocak, C. (2015). Performance improvement with fragmentation threshold for the co-ordination functions by using wireless local area. Dissertation, University of Gazi.
32.
go back to reference Isizoh, A. N., Anazia, A. E., Okide, S. O., Okwaraoka, C. A. P., & Onyeyili, T. I. (2013). Effects of different fragmentation thresholds on data dropped and retransmission attempts in a wireless local area network. IJERA, 3–2, 76–79. Isizoh, A. N., Anazia, A. E., Okide, S. O., Okwaraoka, C. A. P., & Onyeyili, T. I. (2013). Effects of different fragmentation thresholds on data dropped and retransmission attempts in a wireless local area network. IJERA, 3–2, 76–79.
34.
go back to reference Zhai, H., Kwon, Y., & Fang, Y. (2004). Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wireless Communications and Mobile Computing 4, 917–931. Zhai, H., Kwon, Y., & Fang, Y. (2004). Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wireless Communications and Mobile Computing 4, 917–931.
35.
go back to reference Li, T. (2007). Improving performance for CSMA/CA based wireless networks. Dissertation, National University of Ireland. Li, T. (2007). Improving performance for CSMA/CA based wireless networks. Dissertation, National University of Ireland.
36.
go back to reference Malone, D., Clifford, P., & Douglas, J. L. (2006). On buffer sizing for voice in 802.11 WLANs. IEEE Communications Letters, 10–10, 701–703. Malone, D., Clifford, P., & Douglas, J. L. (2006). On buffer sizing for voice in 802.11 WLANs. IEEE Communications Letters, 10–10, 701–703.
37.
go back to reference Li, T., Leith, D., Malone, D. (2011). Buffer sizing for 802.11 based networks. IEEE/ACM Transactions on Networking, 156–169. Li, T., Leith, D., Malone, D. (2011). Buffer sizing for 802.11 based networks. IEEE/ACM Transactions on Networking, 156–169.
38.
go back to reference Vadiati, M., Moghaddam, A. A., Nakhaei, M., Adamowski, J., & Akbarzadeh, A. H. (2016). A fuzzy-logic based decision-making approach for identification of groundwater quality based on groundwater quality indices. Journal of Environmental Management, 184, 255–270.CrossRef Vadiati, M., Moghaddam, A. A., Nakhaei, M., Adamowski, J., & Akbarzadeh, A. H. (2016). A fuzzy-logic based decision-making approach for identification of groundwater quality based on groundwater quality indices. Journal of Environmental Management, 184, 255–270.CrossRef
39.
go back to reference Kustiawan, I., & Chi, K. H. (2015). Handoff decision using a kalman filter and fuzzy logic in heterogeneous wireless networks. IEEE Communications Letters, 19–12, 2258–2261.CrossRef Kustiawan, I., & Chi, K. H. (2015). Handoff decision using a kalman filter and fuzzy logic in heterogeneous wireless networks. IEEE Communications Letters, 19–12, 2258–2261.CrossRef
Metadata
Title
Increasing quality of service in wireless local area networks through fuzzy logic based feedback control method
Authors
Hacı Bayram Karakurt
Cemal Koçak
Publication date
14-03-2023
Publisher
Springer US
Published in
Wireless Networks / Issue 5/2023
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-023-03293-w

Other articles of this Issue 5/2023

Wireless Networks 5/2023 Go to the issue