首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
基于WLAN技术的无线校园网组网研究   总被引:10,自引:0,他引:10  
张圣  陈伟 《信息技术》2005,29(7):17-20
无线局域网(WLAN)使用无线多址信道方法来支持计算机间通信。简要介绍了IEEE802.11g标准协议以及无线局域网基本原理和拓扑结构,并结合无线局域网组网特点,详细阐述设计规划无线校园网的原则、方法和步骤。最后介绍一个可行的802.11g无线校园网设计方案。  相似文献   

2.
随着计算机技术的飞速发展,计算机网络已经被人们广泛应用于各行各业,尤其是无线局域网,它以不需架设线缆的优势将逐步取代传统的有线网络.然而无线局域网在实际环境中,许多因素影响了系统吞吐率,造成无线信道资源的浪费.根据这些因素可以采用容易实现的方法提高系统的吞吐率.  相似文献   

3.
基于IEEE802.11无线局域网的安全性研究   总被引:1,自引:0,他引:1  
李庆  唐学琴 《信息技术》2005,29(8):152-155
随着无线局域网的不断发展,网络安全问题日益突出。这里根据无线局域网信道的特点,首先介绍了无线局域网的安全需求,其次,描述了基于IEEE802.11无线局域网标准的有线等效保密(WEP)协议原理,并对WEP协议存在的安全漏洞及其相应的攻击进行了分析,最后,针对这些安全漏洞和攻击提出了增强无线局域网安全性的改进方案。  相似文献   

4.
Wireless local area networks experience performance degradation in presence of small packets. The main reason for that is the large overhead added at the physical and link layers. This paper proposes a concatenation algorithm which groups IP layer packets prior to transmission, called PAC-IP. As a result, the overhead added at the physical and the link layers is shared among the grouped packets. Along with performance improvement, PAC-IP enables packet-based fairness in medium access as well as includes QoS support module handling delay-sensitive traffic demands. The performance of the proposed algorithm is evaluated through both simulations and an experimental WLAN testbed environment covering the single-hop and the widespread infrastructure network scenarios. Obtained results underline significant performance enhancement in different operating scenarios and channel conditions. Dzmitry Kliazovich received his Masters degree in Telecommunication science from Belarusian State University of Informatics and Radioelectronics in 2002. He is currently working towards the Ph.D. degree in University of Trento, Italy. From September 2005 to February 2006 he was a visiting researcher at the Computer Science Department of the University of California at Los Angeles. He is an author of more than 20 research papers published in international books, journals and conference proceedings. His main research interest lies in field of wireless networking with a focus on performance optimization and cross-layer design. Fabrizio Granelli was born in Genoa in 1972. He received the “Laurea” (M.Sc.) degree in Electronic Engineering from the University of Genoa, Italy, in 1997, with a thesis on video coding, awarded with the TELECOM Italy prize, and the Ph.D. in Telecommunications from the same university, in 2001. Since 2000 he is carrying on his teaching activity as Assistant Professor in Telecommunications at the Dept. of Information and Communication Technology—University of Trento (Italy). In August 2004, he was visiting professor at the State University of Campinas (Brasil). He is author or co-author of more than 60 papers published in international journals, books and conferences, and he is member of the Technical Committee of the International Conference on Communications (from 2003 to 2007) and Global Telecommunications Conference (GLOBECOM2003 and GLOBECOM2004). Dr. Granelli is guest-editor of ACM Journal on Mobile Networks and Applications, special issues on “WLAN Optimization at the MAC and Network Levels” and “Ultra-Wide Band for Sensor Networks”, and Co-Chair of 10th IEEE Workshop on Computer-Aided Modeling, Analysis, and Design of Communication Links and Networks (CAMAD’04). Dr. Granelli is General Vice-Chair of the First International Conference on Wireless Internet (WICON’05) and General Chair of the 11th IEEE Workshop on Computer-Aided Modeling, Analysis, and Design of Communication Links and Networks (CAMAD’06). His main research activities are in the field of networking and signal processing, with particular reference to network performance modeling, medium access control, wireless networks, cognitive radio systems, and video transmission over packet networks. He is Senior Member of IEEE and Associate Editor of IEEE Communications Letters.  相似文献   

5.
Distributed coordination function (DCF) is the basis protocol for IEEE 802.11 standard wireless local area networks. It is based on carrier sense multiple access with collision avoidance (CSMA/CA) mechanism. DCF uses backoff process to avoid collisions on the wireless channel. The main drawback with this process is that packets have to spend time in the backoff process which is an additional overhead in their transmission time. The channel is rendered idle when all the stations defer their transmissions due to their backoff process. Therefore, the channel utilization and the total throughput on the channel can be improved by reducing the average time spent by the packets in the backoff process. In this paper, we propose a new media access coordination function called proposed media access protocol (PMAP) that will improve the channel utilization for successful packet transmission and therefore, the total achievable throughput. In addition, we propose an analytical model for PMAP under saturated conditions. We use this model to analyze the performance of PMAP under saturated conditions. To substantiate the effectiveness of our model, we have verified the model by simulating PMAP in NS‐2. Simulation and analytical results show that under saturated conditions, PMAP shows profound improvement in the throughput performance compared to DCF. In addition, the throughput performance of PMAP under unsaturated conditions is presented. We have also presented the delay performance of PMAP and DCF through simulation in both saturated and unsaturated conditions. Simulation results show that the average delay experienced by the packets is less in PMAP compared to DCF. Further, the variance in the packet delay is same for both PMAP and DCF protocols under unsaturated conditions. From the performance results obtained for PMAP under both saturated and unsaturated conditions, it can be concluded that PMAP is superior in performance compared to DCF. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

6.
After considering the memory effect among series events occurring on the channel, we propose a novel event model to analyze the channel status more precisely. The memory effect is caused by the backoff freezing regulation of IEEE 802.11 Distributed coordination function (DCF), which has been ignored before and thus resulted in the inaccurate evaluation of the network performance. Based on our new event model, the network performance of IEEE 802.11 DCF, including throughput, packet delay distribution and energy efficiency is analyzed. Simulation results show that our model is highly accurate.  相似文献   

7.
Distributed coordination function (DCF) is the fundamental medium access control (MAC) mechanism in IEEE 802.11[1]. There are essentially two MAC techniques in DCF: a basic access method that uses two-way handshaking (DATA-ACK) and a RTS/CTS variant that uses Request-To-Send and Clear-To-Send messages in a four-way handshake (RTS-CTS-DATA-ACK). In a hybrid system, there is a preconfigured RTS threshold. Packet with payload longer than this threshold is transmitted in RTS/…  相似文献   

8.
IEEE 802.11ah is an approved amendment to IEEE 802.11 wireless local area network (WLAN) standard to support growing demand for machine‐to‐machine (M2M) applications. To enable an efficient scheme for accessing the channel by a large number of stations (STAs) within the coverage of an access point, 802.11ah has developed a novel mechanism known as Restrictred Access Window (RAW). Here, a group of STAs attempts channel access during their designated RAW slot by following the carrier sense multiple access‐collission avoidance (CSMA‐CA)‐based enhanced distributed channel access (EDCA) mechanism. In this paper, we develop an analytical model for finding the nonsaturation/saturation throughput of 802.11ah WLAN under the RAW‐based channel access mechanism. We describe an analytical model for finding the average frame delay as well. The impact of the number of STAs and number of groups on network throughput and average delay are presented. We establish that the RAW mechanism can improve the throughput while the average frame delay gets reduced. The analytical results are validated by extensive simulation studies.  相似文献   

9.
The use of wireless technology in industrial networks is becoming more popular because of its flexibility, reduction of cable cost, and deployment time. Providing an accurate model to study the most important parameters of these networks, the timeliness and reliability, is essential in assessing the network metrics and choosing proper protocol settings. The Institute of Electrical and Electronics Engineers (IEEE) 802.11 is a common and established wireless technology, and several analytical models have been proposed to assess its performance; however, most of them are accurate only for a limited network situation, especially data networks that have large packet payloads and are used at high signal to noise ratios, and cannot be applied to study the performance of industrial networks that have short packet lengths and are used in harsh and noisy environments. In this paper, a novel three‐dimensional discrete‐time Markov chain model has been proposed for the IEEE 802.11‐based industrial wireless networks using the distributed coordination function as the medium access control mechanism in the worst‐case saturated traffic. It considers both causes of the backoff freezing: busy channel and the successive interframe space waiting time. In this way, it provides a much more accurate estimation of the channel access and error probabilities, resulting in a more accurate network parameter calculation. Also, based on the proposed model, a comprehensive packet delay analysis, including average, jitter, and cumulative distribution function, has been provided for the near 100% reliable industrial scenario and error‐prone channel condition, which in comparison with similar pieces of work provides much more accurate results. Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   

10.
Since the advent of the first IEEE 802.11 standard for WLANs, several papers have been presented that evaluate the IEEE 802.11 DCF access method. In realistic WLAN environments frame errors usually occur due to non‐ideal channel conditions; in this way, papers including adverse transmission conditions in the evaluation have been published later in the literature. In this paper, we review existent analytical models that include the influence of transmission errors in IEEE 802.11 DCF performance. We modify current models and provide a more accurate analysis, thus allowing the evaluation in single rate and multi‐rate scenarios with stations subject to different link error conditions. Moreover, this paper exposes the unfairness problem that arises in IEEE 802.11 DCF networks with stations subject to different transmission conditions through analytical and simulation results. Stations are not able to distinguish collisions from failed transmissions due to link errors; both result in a missing ACK and, consequently, the transmitting stations apply the exponential backoff algorithm. This fact leads to a lower performance for stations in worse transmission conditions. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

11.
WLAN安全机制     
随着无线局域网技术的广泛应用,新的无线局域网安全标准被提出以增强无线局域网的安全性能.本文介绍了IEEE 802.11i和WAPI两个无线网络安全技术标准的实现机理和具体流程,重点分析了我国自主研发的WAPI的技术特征和应用状况,并将其与IEEE 802.11i技术标准做了分析对比.  相似文献   

12.
The influence of capture effect on the high speed wireless networks is investigated in this paper. A new garkov chain model considering capture effect for the binary exponential back-off scheme in the MAC layer has been proposed. A new throughput model used in the IEEE 802.11 networks is proposed Based on this new Markov chain model, and then we analyzed throughput impacted by the capture effect under different transmission speeds. The performance analysis shows the capture effect has more impact on the throughput of high speed wireless networks than that on the low speed wireless networks.  相似文献   

13.
Wireless local area networks (WLANs) are extremely popular being almost everywhere including business, office and home deployments. The IEEE 802.11 protocol is the dominating standard for WLANs. The essential medium access control (MAC) mechanism of 802.11 is called distributed co‐ordination function (DCF). This paper provides a simple and accurate analysis using Markov chain modelling to compute IEEE 802.11 DCF performance, in the absence of hidden stations and transmission errors. This mathematical analysis calculates in addition to the throughput efficiency, the average packet delay, the packet drop probability and the average time to drop a packet for both basic access and RTS/CTS medium access schemes. The derived analysis, which takes into account packet retry limits, is validated by comparison with OPNET simulation results. We demonstrate that a Markov chain model presented in the literature, which also calculates throughput and packet delay by introducing an additional transition state to the Markov chain model, does not appear to model IEEE 802.11 correctly, leading to ambiguous conclusions for its performance. We also carry out an extensive and detailed study on the influence on performance of the initial contention window size (CW), maximum CW size and data rate. Performance results are presented to identify the dependence on the backoff procedure parameters and to give insights on the issues affecting IEEE 802.11 DCF performance. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

14.
为了准确评估实际网络中IEEE 802.11b分布式协调功能(Distributed Coordination Function,DCF)的系统性能,提出了一种三维Markov链路模型,该模型综合考虑了DCF协议退避计数器冻结状态和有限重传次数,并结合M/M/1/K排队模型给出了在负载有限的情况下DCF系统性能的理论模型。仿真结果表明,该模型能准确地预测IEEE 802.11b DCF协议的系统性能。  相似文献   

15.
In this paper, we estimated the influence of capture effect over the capacity of IEEE 802.11b DCF within a single picocell. The channel utilization is examined analytically by introducing two capture models based on Rayleigh-distributed envelopes of the captured and the interfering frames divided into two local-mean power classes. Simulations in a pure Rician-faded channel depict the conditions under which both Rayleigh-faded capture models can be used to accurately predict the peak network capacity. Unlike the RTS/CTS handshake access mode, Basic access mode is significantly sensitive to the capture ratio, i.e., the receiver design. The packet size threshold over which it is convenient to switch from Basic to RTS/CTS handshake access scheme is also sensitive to the capture effect.  相似文献   

16.
This paper presents a novel analytical model and an efficient admission control (AC) algorithm for IEEE 802.11 distributed coordinated function access mechanism. In contrast to the previous approaches, both saturated and unsaturated states of network are analyzed and the impacts of error‐frame rate and retransmission limit are also taken into account based on an improved Markov chain model. Thus, the network resources can be efficiently utilized. Taking the throughput difference between saturated and unsaturated states as the residual bandwidth, an efficient AC algorithm is designed to utilize the network resources effectively. Extensive simulation data match our analytical results and demonstrate that the AC algorithm is efficient and can make the effective utilization of network resources. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

17.
We investigate how multi‐hop routing affects the goodput and throughput performances of IEEE 802.11 distributed coordination function‐based wireless networks compared with direct transmission (single hopping), when medium access control dynamics such as carrier sensing, collisions, retransmissions, and exponential backoff are taken into account under hidden terminal presence. We propose a semi‐Markov chain‐based goodput and throughput model for IEEE 802.11‐based wireless networks, which works accurately with both multi‐hopping and single hopping for different network topologies and over a large range of traffic loads. Results show that, under light traffic, there is little benefit of parallel transmissions and both single‐hop and multi‐hop routing achieve the same end‐to‐end goodput. Under moderate traffic, concurrent transmissions are favorable as multi‐hopping improves the goodput up to 730% with respect to single hopping for dense networks. At heavy traffic, multi‐hopping becomes unstable because of increased packet collisions and network congestion, and single‐hopping achieves higher network layer goodput compared with multi‐hop routing. As for the link layer throughput is concerned, multi‐hopping increases throughput 75 times for large networks, whereas single hopping may become advantageous for small networks. The results point out that the end‐to‐end goodput can be improved by adaptively switching between single hopping and multi‐hopping according to the traffic load and topology. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

18.
通过无线局域网,帮助野外驻训的官兵获取相关的信息资源。利用一台操作系统为Microsoft Windows Server2003 SP2的电脑作为Web服务器,并选购型号为JCG JHR-N855R的无线路由器进行相关设置,成功搭建局域网。笔记本电脑、IPAD、手机等移动终端均可以访问无线局域网络。野外驻训中担负不同使命任务人员所需的情报资料是一个海量信息,利用无线局域网络在驻地访问服务器资源是解决这种需求的一种有效方式。  相似文献   

19.
Wireless mesh networks (WMNs) have acquired recently enormous attention and momentum; therefore, security aspects have been a fundamental concern for them. Among catastrophic threats on WMNs, Denial‐of‐Service attacks that have become a severe danger because of their plug‐and‐play structural design. Unfortunately, preventing a Denial‐of‐Service attack presents a challenging issue. This fact is induced with the appearance of the source IP addresses spoofing. The resolution key of this issue is to reveal the attack source based on the path through which the attack packet passes. For this, many researchers in IP traceability field propose various methods and techniques to deal with the issue. In this article, we conceive a novel approach named out of band IP traceback approach in WMN (IEEE 802.11s). We create a new architecture using signaling messages for discovering the real source(s) of IP packets. Our solution is based on a security‐oriented signaling protocol. This protocol allows specialized signaling entities to communicate via reliable signaling information. This fact permits us to perform a simple and efficient traceback. In our novel approach, we use 2 radios: the first one transmits normal data packets whereas the second is reserved to exchange IP traceback information. The performance of the proposed scheme is analyzed via simulation analysis using the Network Simulator 3. The simulation results show that our scheme is efficient in dealing with the traceback problem in WMN environments.  相似文献   

20.
为了实现对ZigBee网络远程监控,讨论了在ZigBee网络中采集的物品信息如何用GPRS接入Internet的方式,从而实现远程对ZigBee无线局域网络的信息监测与控制。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号