231 |
A TCP Performance Improvement Scheme with RTS/CTS Signaling In Multihop ad hoc networksLin, Min-Chiung 01 August 2005 (has links)
Ad hoc network is a new tendency of data transmission in the future. Because of the convenience and necessity of mobile phone and/or portable computer coupled with wireless data services, TCP/IP has become an important topic for the study in wireless networks. However, there were a few difficulties in data transmission that must be overcome due to ad hoc environments and the characteristics of the IEEE 802.11 protocols. In these protocols, MAC layer is our primary research topic.
Based on the RTS/CTS signal of dynamic retransmission [4], this study presented an improvement to solve the problems: (1) media resources was easily robbed due to the RTS/CTS signal competition, (2) data frame would be dropped by the IEEE 802.11 protocol due to too many times collisions. In addition, this study modifies the CWND in TCP layer in accordance with congestion conditions. Sender can transmit data packets to the network, in which resources can be completely utilized without any waste or loss. We also use the related parameters from the IP and TCP header to calculate flow numbers. The calculated parameters are recorded in IP and TCP header, and then instantly forwarded to the receiver via routers. The receiver can forward these parameters back to the sender by using back transmission method.
The simulation result shows that the proposed methods can effectively improve TCP performance, such as packet loss rate, and fastly increase the CWND, the buffer utilization, and so forth. Thus, the network can perform more effectively while using the MAC-layer RTS/CTS signal.
|
232 |
A Secure Wireless Network Architecture Proposal To Be Used By Governments In Case Of Emergency SituationsAksoy, Mustafa 01 September 2007 (has links) (PDF)
Since wireless network technology has advanced swiftly and dropped in price, it became a widely used networking option among numerous organizations and even single home users. In spite of their widespread usage by private sector, wireless networks are still undesired alternative for the governments due to security concerns. Although wireless networks possessed lots of proven and documented security flaws at first, with the latest researches and developments this condition ameliorated by the time and wireless networks became much more robust to various security attacks. In this thesis, a secure wireless network architecture that will allow exchange of unclassified information, using 802.11 (Wi-fi) and 802.16 (WIMAX), will be proposed that could be established by
governments in case of emergency situations, namely natural disasters or wars, where cable infrastructure becomes unavailable.
|
233 |
Physical layer interface for IEEE 802.11 MAC / Hårdvaruinterface för IEEE 802.11 MACNorén, Per January 2002 (has links)
<p>There are several standards for wireless communication. People that are involved in computers and networking recognize names like Bluetooth, HiperLAN and IEEE 802.11. A fundamental part of an IEEE 802.11 node is the Medium Access Controller. It establishes and controls communication with other nodes, using a physical layer unit. This is the work that was carried out as a master thesis project at Ericsson Microelectronics. The main goal was to design, implement and evaluate a hardware interface between the MAC and the physical layer. An important part of the work was to find a suitable partition scheme for hardware and software and to achieve this, an investigation of processor-cycles usage was carried out to support design decisions. The hardware/software partition resulted in hardware-functionality for decode of received frames and automatic transmission of acknowledge frames.</p>
|
234 |
Etude de la QoS dans les réseaux ad hoc : intégration du concept de l'ingénierie du traficBrahma, Mohamed 13 December 2006 (has links) (PDF)
Les réseaux sans fil constituent de plus en plus une technologie émergente permettant à ses utilisateurs<br />un accès à l'information et aux services électroniques indépendamment de leurs positions<br />géographiques. Le succès de ce type de réseaux est suscité par un grand intérêt de la part des particuliers,<br />des entreprises et du milieu industriel. Les débits atteints actuellement avec les réseaux<br />sans fil rendent possible le transfert de flux multimédia soumis à de fortes contraintes. Ainsi, le<br />respect de certaines contraintes telles que la bande passante, le délai ou encore le taux de pertes<br />de paquets devient primordial. Cependant, les solutions qui ont été introduites dans le monde des<br />réseaux filaires deviennent inadaptées pour des réseaux utilisant un médium radio partagé sans aucune<br />administration centralisée.<br />Dans ce cadre, plusieurs travaux concernant l'étude de la qualité de service (QoS) dans les réseaux<br />sans fil et notamment les réseaux ad hoc ont été réalisés afin de définir des modèle de QoS, des protocoles<br />d'accès au médium, des protocoles de routage avec QoS et des protocoles de signalisation. Pour<br />cela, notre premier objectif a été l'étude des différents mécanismes de QoS. Ce travail se place donc,<br />dans le cadre de la QoS et la proposition de mécanismes permettant d'offrir des solutions optimales<br />à des applications sensibles à certains facteurs de QoS. L'autre contribution de ce travail se situe<br />dans l'intégration du concept de l'ingénierie du trafic dans les réseaux ad hoc. En effet, ce concept<br />nous a permis de proposer des mécanismes offrant des services différenciés afin d'assurer la QoS dans<br />ces réseaux. De même, nous avons proposé de nouveaux mécanismes d'ordonnancement dans le but<br />de gérer les différents types de flux passant par la couche MAC du standard IEEE 802.11. Enfin, la<br />dernière contribution a été la proposition de solutions d'équilibrage de charge, d'ingénierie de trafic<br />et la validation des différents résultats par le biais de simulations et de preuves mathématiques.
|
235 |
Untersuchung und Bewertung von Netzzugangssteuerungen auf Basis des Standards 802.1x (Port-Based Network Access Control)Richter, Lars 11 March 2005 (has links) (PDF)
In der Arbeit wird der Standard 802.1x (Port-Based Network Access Control) näher betrachtet. Es werden die Funktionsweise und die Eigenschaften dieses Standards aufgezeigt. Weiterhin werden Hardware- und Softwareprodukte für die Nutzung des durch den Standard definierten Authentifizierungsverfahrens vorgestellt und analysiert. Abschließend erfolgt die Betrachtung für den Einsatz an der TU Chemnitz und der damit erfolgten Entwicklung einer Authenticator Komponenten.
|
236 |
Theoretische und experimentelle Untersuchung des IEEE 802.11 (WLAN) Handover-Verfahren im Rahmen eines Voice-over-IP Projektes der Firma SIEMENS.Donner, Sandra 03 May 2005 (has links) (PDF)
Das Ziel dieser Arbeit ist es, ein Handover-Verfahren für ein Siemens Handset zu entwickeln. Die Entwicklungsumgebung beruht auf den Wireless-LAN Standards 802.11 der IEEE (Institute of Electrical and Electronics Engineers). Dabei liegen die Schwerpunkte auf den Standardisierungen 802.11f und 802.11i, wobei sich eine neue Arbeitsgruppe (IEEE 802.11r) direkt mit dem Thema "Handover" beschäftigen
wird. Das Handset soll selbständig die Verwaltung und Einleitung des Handovers
übernehmen und lediglich insofern vom Access Point unterstützt werden, dass dieser
als Informationssammler dient und somit Entscheidungshilfen geben kann.
|
237 |
An investigation of wireless solutions for the "Last Mile" /Varelas, Antonios K. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science and M.S. in Electrical Engineering)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Gilbert M. Lundy, Roberto Cristi. Includes bibliographical references (p. 95-97). Also available online.
|
238 |
SNMP over Wi-Fi wireless networks /Kerdsri, Jiradett. January 2003 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2003. / Thesis advisor(s): Ted Lewis, Geoffrey Xie, Gurminder Singh. Includes bibliographical references (p. 89). Also available online.
|
239 |
A measurement-based admission control mechanism for wireless local area networksBabu, Srinivas Bandi Ramesh 01 June 2005 (has links)
As users become more comfortable using IEEE 802.11 Wireless Local Area Networks, the need for quality of service is becoming more important because of the lack of support in current standards and the increase of multimedia traffic over the Internet. The IEEE 802.11 working group has recognized this fact proposing the Enhanced Distributed Channel Access (EDCA), a priority-based distributed scheme meant to provide service differentiation. EDCA relies on either different Arbitrary Interframe Space (AIFS), or Contention Window (CW) parameters, or both to provide service differentiation. In this thesis, a performance evaluation of the EDCA using five different combinations of the above mentioned parameters is included and compared to the current DCF (Distributed Coordination Function) standard, which is used as the base case. Simulation results show that simpler schemes based on one parameter alone can provide good average service differentiation. However, only multiparameter schemes provide the average and instantaneous high throughput and low delay values needed to support streaming applications. Starvation is a problem spanning all these schemes. It is especially more pronounced in schemes using combinations of parameters. In this thesis, a measurement-based admission control mechanism is proposed to overcome the above stated problems. The admission control mechanism uses an algorithm that admits a flow depending on the jitter values for high priority traffic and the throughput of the low priority traffic. It also allows the administrator to set the bandwidth sharing policy between the high priority traffic and low priority traffic. Results show that the admission control mechanism not only protects existing high priority flows from jitter and low priority flows from starvation, but also improves upon the network utilization.
|
240 |
IEEE 802.11 wireless LAN traffic analysis: a cross-layer approachNa, Chen 28 August 2008 (has links)
Not available / text
|
Page generated in 0.0253 seconds