Advertisement

Neural Computing and Applications

, Volume 31, Issue 10, pp 6113–6128 | Cite as

Fuzzy logic-based performance improvement on MAC layer in wireless local area networks

  • Cemal KocakEmail author
  • Hacı Bayram Karakurt
Original Article
  • 111 Downloads

Abstract

There are many studies that have been done to improve the quality of service of wireless local area networks (WLANs). Institute of Electrical and Electronic Engineers (IEEE) WLAN are based on IEEE 802.11 protocol. The 802.11e medium access control (MAC) protocol is generally recommended for efficient quality of service in WLANs. There are many parameters in the MAC protocol that affect quality of services. Among these parameters, request to send threshold value (RSTV), fragmentation threshold value (FTV) and buffer size (BS) directly affect network performance. RSTV is used in the request to send/clear to send (RTS/CTS) mechanism in the carrier sense multiple access with collision avoidance (CSMA/CA) protocol for collision prevention. This parameter specifies the threshold used to activate the CSMA/CA protocol. FTV is another parameter that is used to send large-sized packets by dividing them into appropriate fragments during CSMA/CA transmission and reduces packet loss in WLAN. BS is another parameter that has a significant cost in the CSMA/CA model and also directly affects the performance. In this article, to improve the performance of WLANs, OPNET Modeler was used and ideal values were obtained for RSTV, FTV and BS by using fuzzy logic-based method. The values obtained by fuzzy logic were re-tested in OPNET Modeler, and the achieved improvement was as follows: for delay 36–38%, for load 2–10% and for throughput 25–44%, respectively. Thus, in WLANs, performance was improved by using fuzzy logic-based method.

Keywords

Wireless local area network Request to send threshold Fragmentation threshold Buffer size Fuzzy logic 

Abbreviations

QoS

Quality of service

WLANs

Wireless local area networks

MAC

Medium access control

RSTV

Request to send threshold value

FTV

Fragmentation threshold value

BS

Buffer size

RTS/CTS

Request to send/clear to send

CSMA/CA

Carrier sense multiple access with collision avoidance

DCF

Distributed coordination function

VoIP

Voice over internet protocol

AP

Access point

SIFS

Short interframe space

NAV

Network allocation vector

ACK

Acknowledgment

DIFS

Distribution interframe space

SIFS

Short interframe space

ANN

Artificial neural network

PSO

Particle swarm optimization

GA

Genetic algorithm

BDP

Bandwidth-delay product

S

Short

N

Normal

L

Long

SM

Small

LR

Large

VL

Very long

VS

Very short

List of symbols

fD

Delay

fL

Load

fT

Throughput

m

RSTV (byte)

n

FTV (byte)

k

BS (bits)

x

Other mandatory inputs

e

Euler number

Notes

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

References

  1. 1.
    Singh H, Singh T, Kaur M (2014) Improving the quality of service of EDCF over DCF for real time applications using probability algorithm. IJARCCE 3(4):6330–6333Google Scholar
  2. 2.
    Dalvi A, Svamy P, Meshram BB (2011) DCF improvement for satisfactory throughput of 802.11 WLAN. IJCSE 3(7):2862–2868Google Scholar
  3. 3.
    Borsuk B, Koçak C (2016) RTS/CTS mechanism’s effect on performance in multimedia applications when hidden node problem occurs on wireless networks. Int J Inform Technol 9(2):187–195.  https://doi.org/10.17671/btd.44133 CrossRefGoogle Scholar
  4. 4.
    Yun JH, Seo SW (2007) Novel collision detection scheme and its applications for IEEE 802.11 wireless LANs. Comput Commun 30:1350–1366CrossRefGoogle Scholar
  5. 5.
    Malik S, Chaudhary R, Pathak A, Chakraborty PS (2015) Modeling and analysis of IEEE 802.11 DCF MAC. Proc Comput Sci 57:473–482CrossRefGoogle Scholar
  6. 6.
    Choi S, Prado JD, N. SS, Mangold S (2003) IEEE 802.11e contention-based channel access (EDCF) performance evaluation. In: IEEE international conference on communications, 2003. ICC ‘03. IEEE.  https://doi.org/10.1109/icc.2003.1204546
  7. 7.
    Kaur I, Bala M, Bajaj H (2012) Performance evaluation of wlan by varying Pcf, Dcf and enhanced Dcf slots to improve quality of service. IOSRJCE 2(5):29–33CrossRefGoogle Scholar
  8. 8.
    Karakurt HB, Kocak C (2015) On wireless network PCF, DCF and EDCF with fragmentation threshold. In: XVII. academic informatics conference Eskisehir/TurkeyGoogle Scholar
  9. 9.
    Sidelnikov A, Yu J, Choi S (2006) Fragmentation/Aggregation scheme for throughput enhancement of IEEE 802.11n WLAN. In: Proceeding IEEE APWCS 2006, Daejon August 24–25Google Scholar
  10. 10.
    Preveze B (2011) Cognitive methods in multimedia communications. Dissertation, University of BaskentGoogle Scholar
  11. 11.
    Zhao-Xiang W, Hai-Lun X, Wei D (2008) A fuzzy logic cooperative MAC for MANET. J China Univ Posts Telecommun 15(1):55–60CrossRefGoogle Scholar
  12. 12.
    Frantti T, Koivula M (2011) Fuzzy packet size control for delay sensitive traffic in ad hoc networks. Expert Syst Appl 38:10188–10198CrossRefGoogle Scholar
  13. 13.
    Collotta M (2015) FLBA: a fuzzy algorithm for load balancing in IEEE 802.11 networks. J Netw Comput Appl 53:183–192CrossRefGoogle Scholar
  14. 14.
    Ali ES, Abd Elazim SM, Abdelaziz AY (2006) Improved harmony algorithm and power loss index for optimal locations and sizing of capacitors in radial distribution systems. Int J Elect Power Energy Syst 80:252–263CrossRefGoogle Scholar
  15. 15.
    Oshaba AS, Ali ES, Abd Elazim SM (2017) PI controller design for MPPT of photovoltaic system supplying SRM via BAT search algorithm. Neural Comput Appl 28(4):651–667CrossRefGoogle Scholar
  16. 16.
    Oshaba AS, Ali ES, Abd Elazim SM (2017) PI controller design using ABC algorithm for MPPT of PV system supplying DC motor-pump load. Neural Comput Appl 28(2):353–364CrossRefGoogle Scholar
  17. 17.
    Ratnayake DN, Kazemian HB, Yusuf SA (2014) Identification of probe request attacks in WLANs using neural networks. Neural Comput Appl 25:1–14CrossRefGoogle Scholar
  18. 18.
    Abualhaj MM, Abu-Shareha AA, Al-Tahrawi MM (2016) FLRED: an efficient fuzzy logic based network congestion control method. Neural Comput Appl.  https://doi.org/10.1007/s00521-016-2730-9 CrossRefGoogle Scholar
  19. 19.
    Chatterjee S, Nigam S, Roy A (2017) Software fault prediction using neuro-fuzzy network and evolutionary learning approach. Neural Comput Appl 28:1221–1231CrossRefGoogle Scholar
  20. 20.
    Mohammadi R, Javidan R (2017) An adaptive type-2 fuzzy traffic engineering method for video surveillance systems over software defined networks. Multimed Tools Appl 76:23627–23642CrossRefGoogle Scholar
  21. 21.
    Manoj K, Sharma SC, Arya L (2009) Fuzzy based QoS analysis in wireless Ad hoc network for DSR protocol. In: 2009 IEEE international advance computing conference (IACC 2009) Patiala, India, 6–7 MarchGoogle Scholar
  22. 22.
    Oche A, Alison E,,Mohammad G, Hasan S, Yu H (2013) Fuzzy logic based packet scheduling algorithm for Mobile ad-hoc Network with a realistic propagation model. In: Proceedings of the 19th international conference on automation & computing, Brunel University, Uxbridge, 13–14 SeptemberGoogle Scholar
  23. 23.
    Sayedahmed HAM, Hefny HA, Fahmy IMA (2017) Proposed fuzzy stability model to improve multi-hop routing protocol. Int J A Comput Sci Appl 8(4):137–143Google Scholar
  24. 24.
    Al-Naamany A, Bourdoucen H (2009) Design and simulation of a fuzzy logic bandwidth controller for users classification and priorities allocations. Int J Comput Appl 31(1):23–29Google Scholar
  25. 25.
    Tabatabaei S, Behravesh R (2017) Fuzzy logic-based multicast routing in multiradio multichannel wireless mesh networks. Cybern Syst Int J 48(1):13–28CrossRefGoogle Scholar
  26. 26.
    Karakurt HB, Kocak C (2015) Performance improvement with fragmentation threshold for the co-ordination functions by using wireless local area. Dissertation, University of GaziGoogle Scholar
  27. 27.
    Ibrahim IK (2006) Handbook of research on mobile multimedia. Linz, AustriaGoogle Scholar
  28. 28.
    Isizoh AN, Anazia AE, Okide SO, Okwaraoka CAP, Onyeyili TI (2013) Effects of different fragmentation thresholds on data dropped and retransmission attempts in a wireless local area network. IJERA 3(2):76–79Google Scholar
  29. 29.
    Wang Q, Yuan D (2010) An adaptive backoff algorithm for IEEE 802.11 DCF with cross-layer optimization. In: Conference on WiCOM, 2010 6th International.  https://doi.org/10.1109/wicom.2010.5601153
  30. 30.
    Zhao Z, Darbha S, Reddy ALN (2004) A method for estimating the proportion of nonresponsive traffic at a router. IEEE/ACM Trans Netw 12(4):708–718CrossRefGoogle Scholar
  31. 31.
    Raina G, Wischik D (2005) Buffer sizes for large multiplexers: TCP queueing theory and instability analysis. Next Gener Internet Netw.  https://doi.org/10.1109/NGI.2005.1431663 CrossRefGoogle Scholar
  32. 32.
    Enachescu M, Ganjali Y, Goel A, McKeown N, Roughgarden T (2006) Routers with very small buffers. INFOCOM 2006. In: Proceedings 25th IEEE international conference on computer communications.  https://doi.org/10.1109/infocom.2006.240
  33. 33.
    Wischik D, McKeown N (2005) Part I: buffer sizes for core router. ACM SIGCOMM Comput Commun Rev 35(3):75–78CrossRefGoogle Scholar
  34. 34.
    Malone D, Clifford P, Leith DJ (2006) On buffer sizing for voice in 802.11 WLANs. IEEE Commun Lett 10(10):701–703CrossRefGoogle Scholar
  35. 35.
    Pilosof S, Ramjee R, Raz D, Shavitt Y, Sinha P (2003) Understanding TCP fairness over Wireless LAN. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies  https://doi.org/10.1109/infcom.2003.1208924
  36. 36.
    Thottan M, Weigle MC (2006) Impact of 802.11e EDCA on mixed TCP-based applications. In: WICON ‘06 proceedings of the 2nd annual international workshop on Wireless internet  https://doi.org/10.1145/1234161.1234187
  37. 37.
    Li T (2007) Improving performance for CSMA/CA based wireless networks. Dissertation, National University of IrelandGoogle Scholar
  38. 38.
    Malone D, Clifford P, Douglas JL (2006) On buffer sizing for voice in 802.11 WLANs. IEEE Commun Lett 10(10):701–703CrossRefGoogle Scholar
  39. 39.
    Zhai H, Kwon Y, Fang Y (2004) Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wirel Commun Mob Comput 4:917–931.  https://doi.org/10.1002/wcm.263 CrossRefGoogle Scholar
  40. 40.
    Li T, Leith D, Malone D (2011) Buffer sizing for 802.11 based networks. IEEE/ACM Trans Netw 19(1):156–169CrossRefGoogle Scholar
  41. 41.
    Vadiati M, Asghari-Moghaddam A, Nakhaei M, Adamowski J, Akbarzadeh AH (2016) A fuzzy-logic based decision-making approach for identification of groundwater quality based on groundwater quality indices. J Environ Manag 184:255–270CrossRefGoogle Scholar
  42. 42.
    Kustiawan I, Chi KH (2015) Handoff decision using a kalman filter and fuzzy logic in heterogeneous wireless networks. IEEE Commun Lett 19(12):2258–2261CrossRefGoogle Scholar

Copyright information

© The Natural Computing Applications Forum 2018

Authors and Affiliations

  1. 1.Computer Engineering Department, Faculty of TechnologyGazi UniversityAnkaraTurkey
  2. 2.Institute of Science, Faculty of TechnologyGazi UniversityAnkaraTurkey

Personalised recommendations