Connection control by virtual admission in wireless LAN environment

Yen Wen Chen, Yuan Long Lee, I. Hsuan Peng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


The traditional wireless technology confronted with some short-comings in practical use, such as insufficiency for bandwidth, and lack of guaranteed on Quality of Services (QoS). Both of the packet scheduling and connection admission control are the main consideration issues toward QoS networks. These two issues are mutually correlated. In this paper, we propose a measurement based with fake priority scheme for the control of connection admission in WLAN. As the concept of the virtual source and virtual MAC (VS/VMAC) is applied, the proposed scheme will not affect the transmission of existing traffic during traffic probing. The proposed scheme also provides a difference factor (D factor) for the compensation of the performance measured by VMAC. This factor is also applied to control the tightness of the policy of connection acceptance. The simulations results show that the proposed scheme can effectively manage the connection requests while maintaining QoS in WLAN.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - First International Conference, WASA 2006, Proceedings
PublisherSpringer Verlag
Number of pages12
ISBN (Print)3540371893, 9783540371892
StatePublished - 2006
EventFirst International Conference on Wireless Algorithms, Systems, and Applications, WASA 2006 - Xi'an, China
Duration: 15 Aug 200617 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4138 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceFirst International Conference on Wireless Algorithms, Systems, and Applications, WASA 2006


  • Connection Admission Control
  • QoS
  • WLAN


Dive into the research topics of 'Connection control by virtual admission in wireless LAN environment'. Together they form a unique fingerprint.

Cite this