1,872 Hits in 4.9 sec

A framework for wireless LAN monitoring and its applications

Jihwang Yeo, Moustafa Youssef, Ashok Agrawala
2004 Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04  
Our characterization reveals rich information about the PHY/MAC layers of the IEEE 802.11 protocol such as the typical traffic mix of different frame types, their temporal characteristics and correlation  ...  Moreover, we identify various anomalies in protocol and security of the IEEE 802.11 MAC. Regarding the security, we identify malicious usages of WLAN, such as email worm and network scanning.  ...  We also want to thank Nikhil Purushe for the helps in SNR measurement in Section 3.4. Finally, we thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1145/1023646.1023660 dblp:conf/ws/YeoYA04 fatcat:bg7q7l7qinhqbhen5el53ffmcu

Capture-aware staggering for concurrent transmissions

Naveen Santhapuri, Srihari Nelakuditi, Romit Roy Choudhury
2007 Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07  
So, capture-awareness needs to be incorporated into MAC protocols to enable concurrent communications where feasible.  ...  Our idea is somewhat similar to the one proposed for enterprise WLANs in [4] but is designed to extract benefits from capture-awareness. We now briefly describe our scheme.  ... 
doi:10.1145/1364654.1364713 dblp:conf/conext/SanthapuriNC07 fatcat:66z3pfpqzbdajbl3sdgpivtq3a

A-MAC: Adaptive Medium Access Control for Next Generation Wireless Terminals

Mehmet C. Vuran, Ian F. Akyildiz
2007 IEEE/ACM Transactions on Networking  
A-MAC introduces a two-layered MAC framework that accomplishes the adaptivity to both architectural heterogeneities and diverse QoS requirements.  ...  Based on the Virtual Cube concept, A-MAC provides architecture-independent decision and QoS based scheduling algorithms for efficient multi-network access.  ...  In addition to the proposed MAC protocols, there has been extensive research on the physical layer of NG wireless terminals.  ... 
doi:10.1109/tnet.2007.893202 fatcat:qp3qwibz7ne2nn3yaq3ce6onge

On the performance of Redundant Traffic Elimination in WLANs

Emir Halepovic, Majid Ghaderi, Carey Williamson
2012 2012 IEEE International Conference on Communications (ICC)  
However, frame retransmissions generate additional traffic at MAC layer, which reduces the effectiveness of RTE in general case.  ...  We find that including parts of MAC headers in RTE can increase overall bandwidth savings by up to 53% in a public WLAN.  ...  We start by considering MAC-layer RTE savings for WLAN, as opposed to only IP-layer savings considered in previous works.  ... 
doi:10.1109/icc.2012.6364592 dblp:conf/icc/HalepovicGW12 fatcat:zbm4e3pckfh2rprzdwz5yvqfcq

Quality of service provision in mobile multimedia - a survey

Hongli Luo, Mei-Ling Shyu
2011 Human-Centric Computing and Information Sciences  
In this paper, we provide a survey of QoS provision in mobile multimedia, addressing the technologies at different network layers and cross-layer design.  ...  We also provide some thoughts about the challenges and directions for future research.  ...  implementing WLAN computer communication by defining the media access control (MAC) and physical (PHY) layers for a LAN with wireless connectivity.  ... 
doi:10.1186/2192-1962-1-5 fatcat:7pgdveybc5bdjd6k26mkfnhy3y


Rohan Thakkar .
2014 International Journal of Research in Engineering and Technology  
Depending on their applications, the solutions have focused mainly on the following three network layers: Media Access Control layer (MAC), Application layer (APP) and Physical layer (PHY).  ...  For the sake of adaptive QoS, the cross-layer architecture assumes that layer information could be exchanged between application layer and lower layers.  ...  We would also like to thank him for guiding us in the implementation of the prototype.  ... 
doi:10.15623/ijret.2014.0307060 fatcat:qwa23quyorfy3pxf6lzjpu6neq

A New Mechanism for Network Monitoring and Shielding in Wireless LAN

Jiujun Cheng, Liufei Hu, Junjun Liu, Qingyang Zhang, Chendan Yan
2014 Mathematical Problems in Engineering  
During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security.  ...  We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges.  ...  Then, they applied those techniques to academic research WLAN over two weeks for MAC traffic characterization and network diagnosis. Wireless monitoring is of prime importance for WLAN security.  ... 
doi:10.1155/2014/620926 fatcat:xncgptgsefa2fckmrl5solc7gu

A Cross-Layer Interworking of DVB-T and WLAN for Mobile IPTV Service Delivery

Ismail Djama, Toufik Ahmed
2007 IEEE transactions on broadcasting  
We propose a seamless cross-layer inter-working between broadcasting network (i.e. DVB-T) and 802.11 WLAN network for adaptive and interactive mobile TV service delivery.  ...  The 802.11 WLAN is considered today as the "de-facto" wireless access network for the last miles connection.  ...  The 802.11 standards cover both the Physical Layer and the Medium Access Control (MAC) layer. They were conceived for the best effort traffic.  ... 
doi:10.1109/tbc.2006.889111 fatcat:cj4oor7d3zcbndpr3hhnvwpupe

WLAN Security Issues and Solutions

Deepika Dhiman
2014 IOSR Journal of Computer Engineering  
This makes it harder for a hacker to access your network with a random MAC Address. However, the physical address of IP packets can be forged, so this is less secure authorization certification.  ...  XOR operation for WEP cracking  ...  They are launched specifically against WLAN networks at Layer 1/Physical layer and Layer 2/Data Link Layer [23] .  ... 
doi:10.9790/0661-16146775 fatcat:gx7elp5sqrfg5h2geneecyde6m

Effect of propagation environment on area throughput of dense WLAN deployments

Ali Ozyagci, Ki Won Sung, Jens Zander
2013 2013 IEEE Globecom Workshops (GC Wkshps)  
In this paper, we investigate the area throughput of densely deployed WLANs in different indoor propagation environments by conducting detailed MAC layer simulations using OPNET.  ...  As WLAN deployments become increasingly dense, WLANs start to cause more and more contention and interference to each other, to the point that they cause significant throughput degradation to other WLANs  ...  take physical layer details and hidden nodes into account.  ... 
doi:10.1109/glocomw.2013.6825009 dblp:conf/globecom/OzyagciSZ13 fatcat:4smra7mdd5g2tnzeklni2wzgp4

LUPMAC: A cross-layer MAC technique to improve the age of information over dense WLANs

Antonio Franco, Emma Fitzgerald, Bjorn Landfeldt, Nikolaos Pappas, Vangelis Angelakis
2016 2016 23rd International Conference on Telecommunications (ICT)  
This technique lets the MAC layer keep only the most up to date packets of a particular piece of information in the buffer.  ...  We also introduce a new cross layer MAC technique, called Latest UPdate MAC (LUPMAC), aimed at modifying the existing IEEE 802.11 in order to minimize the average AoI at the receiver end.  ...  Finally, in our work the MAC layer should be aware only of the application that generated the packet and the packet's age, while in LO the MAC layer should signal the application whenever a transmission  ... 
doi:10.1109/ict.2016.7500469 dblp:conf/ict/FrancoFLPA16 fatcat:4nwygksu3rcbthrv2vjo77xesy

WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications

Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed, Ali Kashif Bashir
2020 Future Internet  
In this work, we propose a WLAN Aware Cognitive Medium Access Control (WAC-MAC) protocol for IoT users that uses techniques, such as energy detection based sensing, adaptive wake-up scheduling, and adaptive  ...  This interference causes frequent packet drop and energy loss for IoT users.  ...  IEEE 802.11 specifies medium access control, physical layer rules, and algorithms for WLAN.  ... 
doi:10.3390/fi12010011 fatcat:blsn2crad5ftlfa66pfkw5wkhi

A Goodness Based Vertical Handoff Algorithm for Heterogeneous Networks [chapter]

Shankar K. Ghosh, Sasthi C. Ghosh
2016 Lecture Notes in Computer Science  
The notion of goodness explicitly considers the MAC layer scheduling along with current load and interference of the candidate networks.  ...  Inclusion of MAC layer scheduling information in the design of different VHO algorithms has previously been very limited though it is important as both user and system performance depend on it.  ...  Notion of Goodness for an Access Network The actual physical rate perceived by an user while roaming across the 3G-WLAN heterogeneous network explicitly depends on the MAC scheduling algorithm run by the  ... 
doi:10.1007/978-3-319-33936-8_20 fatcat:k33pndwmp5glvgbfvagt7l7o6e

Evaluation of Enhanced Security Solutions in 802.11-Based Networks [article]

Ifeyinwa Angela Ajah
2014 arXiv   pre-print
Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.  ...  Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it.  ...  They equally lack capacity to handle attacks on physical layer since they provide security on layer two and above.  ... 
arXiv:1409.2261v1 fatcat:oxoy63ou7rb5djwgd4sxzcj2wi

Wireless LAN Service Quality Optimization in Academic Environments

Moses E. Ekpenyong, Uduak A. Umoh, Udoinyang G. Inyang, Aniekpeno M. Jackson
2017 Modern Applied Science  
However, combining the three campuses produced the least mean absolute error (MAE) of 0.0979 for train data, and the highest MAE of 0.7345 for test data.  ...  Further, the least MAE of 0.4707 for test data was obtained from town campus Annex.  ...  Uyo -for their involvement in the fieldwork phase of this research (test bed construction, field measurements, and deployment).  ... 
doi:10.5539/mas.v11n10p166 fatcat:ockheliepndsth7fk4vgy6oru4
« Previous Showing results 1 — 15 out of 1,872 results