首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we analytically study the dense basic service set network transmission problems in very high throughput (VHT, namely IEEE 802.11ac) wireless local area networks (WLANs) due to nervous bandwidth resources. Our contributions are threefold as follows. Firstly, we derive the closed-form expressions of throughput gains for primary channel establishment from multi-band selection using the optimal skipping rule, which balances the throughput gain from finding a good quality band with the overhead of measuring multiple bands. Secondly, in order to satisfy the quality of service of overlapping BSS users, we design a space interference avoidance mechanism, which can improve the system throughput for the whole dense WLANs. Thirdly, in order to further improve the transmission performance of dense BSS networks, we propose an unequal bandwidth transmission mechanism based on the VHT WLANs, which can not only clear the redundant network allocation vector duration timely but also use the limited bandwidth efficiently. The proposed protocols and mechanisms exploit both time and frequency diversity sufficiently, and are shown to result in typical throughput gains compared with the traditional IEEE 802.11 MAC protocol.  相似文献   

2.
Sun  Ya-Ku  Chen  Kwang-Cheng 《Wireless Networks》1998,4(5):353-364
In mobile communication networks operating in unreliable physical transmission, random access protocol with the collision resolution (CR) scheme is more attractive than the ALOHA family including carrier sense multiple access (CSMA) [IEEE Networks (September 1994) 50–64], due to likely failure on the channel sensing. Being a member of CR family schemes, a protocol known as non-preemptive priority multiple access (NPMA) is utilized in a new high-speed wireless local area network, HIPERLAN, standardized by European Telecommunication Standard Institute (ETSI). A conceptually three-layer CR multiple access protocol generalized from NPMA, supporting single type of traffic, is thus presented and analyzed in this paper. The CR capability of such a protocol (and hence NPMA) is proved to be significant by numerical substantiation that additional collision detection schemes are dispensable; also its throughput/delay performance is excellent when the proportion of the transmission phase to a channel access cycle is large enough (i.e., the winner of contention should transmit all of its packets successively). On the other hand, the simulated performance of NPMA serving integrated traffic is not fully satisfactory, primarily due to its distributed control mode and distinguishing traffic types only by the prioritization process.  相似文献   

3.
Address Resolution Protocol (ARP) is an essential protocol for the operation of local area networks. It is used for mapping the logical address to the physical address. However, ARP was designed without any security features. Therefore, ARP is vulnerable to many ARP spoofing attacks, such as the host impersonation, man‐in‐the‐middle (MITM), and denial of service (DoS) attacks. Many techniques were introduced in the literature for mitigating ARP spoofing attack. However, they could not provide protection against the host impersonation and DoS attacks. This work introduces a new technique to secure address resolution protocol called ARP Authentication (ARP‐A). The proposed technique provides authentication for ARP messages and entities. In addition, it converts ARP from a stateless to a stateful protocol. To evaluate the performance of ARP‐A, it was implemented on Linux. To investigate the scalability of ARP‐A, a new analytical model was designed for it using stochastic reward nets. The results show that, compared with other related schemes introduced in the literature, ARP‐A is more efficient in terms of security and performance.  相似文献   

4.
Coskun  Mehmet B.   《Ad hoc Networks》2008,6(6):860-877
Designing a medium access control (MAC) protocol that simultaneously provides high throughput and allows individual users to share limited spectrum resources fairly, especially in the short-term time horizon, is a challenging problem for wireless LANs. In this paper, we propose an efficient cooperative MAC protocol with very simple state information that considers only collisions, like the standard IEEE 802.11 MAC protocol. However, contrary to the IEEE 802.11 MAC, the cooperative MAC gives collided users priority to access the channel by assigning them shorter backoff counters and interframe-spaces than users who did not participate in the collision event. In other words, collided users are the only ones allowed to transmit in the following contention period. For the cooperative MAC protocol, we utilize an analytical throughput model to obtain the optimal parameter settings. Simulation results show that the cooperative MAC provides significant improvement in short-term fairness and access delay, while still providing high network throughput.  相似文献   

5.
Uddin  Md. Forkan 《Wireless Networks》2019,25(6):3365-3384
Wireless Networks - The existing medium access control (MAC) protocols are not able to utilize the full opportunities from power-domain non-orthogonal multiple access (NOMA) technique in wireless...  相似文献   

6.
认知无线传感器网络(CRSN)是一种将认知无线电(CR)技术引入传统WSN中的新型网络,具有一定的应用价值和发展前景.然而,CRSN中的认知功能带来的额外能耗和处理要求及其高成本实现,阻碍了它的进一步发展及应用.基于此,提出将认知功能迁移到另外一类节点——认知节点,并使其拥有较强的处理能力和能量收集能力.认知节点与普通传感器节点按照一定比例进行部署,组成另外一种新型网络——异质节点CRSN (HT-CRSN),这种新型网络能够提高网络性能并降低部署成本.并提出了一种能够适用于这种异质节点传感器网络的工作时序及其一系列可行性的MAC协议(FBP等).通过对所提MAC协议的能耗分析,说明可以通过调整两类异质节点的部署比例和能量收集速率均衡两类异质节点的能耗,进而提高网络生命周期.  相似文献   

7.
In IEEE 802.11, the rate of a station (STA) is dynamically determined by link adaptation. Low-rate STAs tend to hog more channel time than high-rate STAs due to fair characteristics of carrier sense multiple access/collision avoidance, leading to overall throughput degradation. It can be improved by limiting the transmission opportunities of low-rate STAs by backoff parameters. This, however, may cause unfair transmission opportunities to low-rate STAs. In an attempt to increase overall throughput by volunteer high-rate relay STAs while maintaining fairness, we propose a new cooperative medium access control (MAC) protocol, relay-volunteered multi-rate cooperative MAC (RM-CMAC) based on ready to send/clear to send in multi-rate IEEE 802.11. In the RM-CMAC protocol, we show that the effect of hogging channel time by low-rate STAs can be remedied by controlling the initial backoff window size of low-rate STAs and the reduced transmission opportunity of low-rate STAs can be compensated by the help of volunteer high-rate relay STAs. We analyze the performance of RM-CMAC, i.e., throughput and MAC delay, by a multi-rate embedded Markov chain model. We demonstrate that our analysis is accurate and the RM-CMAC protocol enhances the network throughput and MAC delay while maintaining the fairness of low-rate STAs.  相似文献   

8.
9.
一般的随机访问信道(RACH),延时特性只有均值,很难有明确的上限保证,所以对部分实时业务性能难以保证。树型算法则可以对日前处理的业务提供明确的延时上限,然而一般的固定树型算法对于无线信道的业务波动情况没有适应能力,例如树型分支固定,只能适合一定强度的到达业务,其他情况下会导致信道利用率下降和延时增加。本文针对随机访问信道协议,在固定树型算法的基础上,结合随机接续协议,给出了一种混合动态树型算法,目的是提高一般树型算法的信道利用率,保证延时指标的上限。  相似文献   

10.

Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for restricting the access of unauthorized users to the enterprise scale networks. IEEE 802.1X defines a secure and reliable authentication framework for 802.11 WLANs, where Extensible Authentication Protocol (EAP) provides the base to this architecture. EAP is a generic architectural framework which supports extensibility by incorporating the new and improved authentication schemes, which are based on different types of credentials. Currently there exist a number of EAP and Non-EAP methods with varying level of security and complexity. In this work, we have designed a new n-secret based authentication scheme referred here as Personal Dialogue Based Authentication, for the client authentication to the network. It is a Transport Layer Security (TLS) protected authentication protocol, which will be executed inside the secure TLS tunnel for providing the privacy and credential security to the wireless client. The developed authentication protocol has a reasonable set of features like; strong security, user privacy, simplicity and extensibility. For the formal analysis of the protocol we have used SPAN–AVISAP model checker on Ubuntu platform for validating the realization of the specified security goals. The experimental results obtained by simulation performed with the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our protocol is efficient and secured.

  相似文献   

11.
12.
Kim  B.C. Jang  J.S. Un  C.K. 《Electronics letters》1995,31(9):698-700
The authors propose an idle-signal casting multiple access with collision resolution (ICMA/CR) protocol for wireless LAN. This protocol focuses on efficient collision resolution by adopting the binary-tree protocol. By using the collision resolution algorithm, the retransmission process can be controlled so that collisions are resolved more efficiently using nearly immediate feedback information, thereby increasing the throughput-delay performance of the ICMA/CD protocol  相似文献   

13.
This paper presents adaptive algorithms for estimating the location of a mobile terminal (MT) based on radio propagation modeling (RPM), Kalman filtering (KF), and radio-frequency identification (RFID) assisting for indoor wireless local area networks (WLANs). The location of the MT of the extended KF positioning algorithm is extracted from the constant-speed trajectory and the radio propagation model. The observation information of the KF tracker is extracted from the empirical and RPM positioning methods. Specifically, a sensor-assisted method employs an RFID system to adapt the sequential selection cluster algorithm. As compared with the empirical method, not only can the RPM algorithm reduce the number of training data points and perform on-line calibration in the signal space, but the RPM and KF algorithms can alleviate the problem of aliasing. In addition, the KF tracker with the RFID-assisted scheme can calibrate the location estimation and improve the corner effect. Experimental results demonstrate that the proposed location-tracking algorithm using KF with the RFID-assisted scheme can achieve a high degree of location accuracy (i.e., more than 90% of the estimated positions have error distances of less than 2.1 m).  相似文献   

14.
It is known that hidden-terminal is one of the main problems in ad hoc wireless networks. In addition, there are scenarios where the desired destination is located in the range of other transmitters, so that the efforts on setting up communication with this terminal will fail due to collisions that may occur between transmitted control frames and undesired received control and data frames. This phenomenon becomes a bottleneck when most of data transmissions experience packet fragmentation. In such scenarios, the desired destination becomes unreachable during the data transfer of neighboring nodes. Furthermore, another problem that arises in such networks is in the case of mobile nodes with heterogeneous power capabilities where low power nodes have a disadvantage in accessing media due to higher levels of interference from the high power nodes. Conventional protocols can not address the aforementioned problems efficiently, resulting in throughput and channel utilization degradation. Using the same PHY of IEEE 802.11 and making slight modifications in its MAC, a new medium access control scheme is presented in this paper to address such problems. The performance of the proposed approach is compared with earlier schemes through simulation-based evaluations, showing performance enhancement due to better handling of unreachability issues in the proposed MAC scheme.  相似文献   

15.
为进一步提高无线射频识别系统单个读写器识别电子标签的速率,设计了一种将码分与统计时分技术相结合的新型无线射频识别系统的空中接口协议,并分析了系统的抗噪声性能、识别速率等主要性能指标。仿真结果表明,新型无线射频识别系统在抗噪声性能和识别速率等方面均优于基于现有国际标准ISO/IEC 18000-6C的无线射频识别系统。  相似文献   

16.
In this paper, the CSMA/CD protocol with deterministic collision resolution implemented in some Intel devices is analyzed. An approximate throughput-delay analysis is performed. The results of the analysis are validated by simulation. Finally, we briefly present additional results obtained from the simulation.This work was supported by CICYT of the Spanish Government under project TAP93-0443.  相似文献   

17.
The use of adaptive optical systems using electrically deformable mirrors to compensate for turbulence effects is discussed. Since these systems require bright reference sources adjacent to the object of interest and can be used only to observe the brightest stars, artificial guide stars suitable for controlling an adaptive imaging system must be created in the upper atmosphere by using a laser to excite either Rayleigh backscattering in the stratosphere or resonance backscattering in the mesospheric sodium layer. The design requirements of a laser-guided adaptive telescope, as well as the expected imaging performance, are discussed in detail. It is shown that a 2-m ground-based laser-guided telescope can achieve imaging performance levels at visible wavelengths nearly matching the theoretical imaging performance of the Hubble Space Telescope (HST). The required lasers can be either bought off the shelf or built with current technology. The laser power requirement for the Rayleigh guide star approach is on the order of 82 W for zenith viewing when the atmospheric seeing cell diameter is 20 cm. For the same conditions the laser power requirement for the Na guide star approach is on the order of 14 W. Both systems will achieve near diffraction limited imaging with a Strehl ratio of ~0.67 and an angular resolution of approximately 0.07 arcsec for an observation wavelength of 0.5 μm  相似文献   

18.
姚元飞  杨巍  陈立强 《电讯技术》2019,59(12):1385-1390
在复杂电磁环境下,由于民航地空通信大频偏的要求,滤波器无法滤除波道内的干扰。针对此问题,提出了一种自适应抗干扰系统设计方法。对于落在波道内且与地空通信信号有效频带不重叠的干扰,首先对通信信号进行载波频率估计,然后使用自适应滤波方法进行干扰抑制;对于落在波道内且与地空通信信号有效频带重叠的恒包络干扰,首先重构载波信号,消除对恒包络信号估计的影响,然后根据恒包络信号的特性重构干扰信号并进行干扰分离。实验结果表明,该系统设计方法在不改变民航地空通信架构的前提下,抗有效频带外干扰的能力最大可以提升23.8 dB,抗恒包络干扰的能力最大可以提升39.4 dB,从而可以大幅提高航空飞行安全水平。  相似文献   

19.
This investigation proposes a fixed collision rate (FCR) back-off algorithm for wireless networks. The proposed scheme takes advantage of the central unit (CU) in a wireless network to broadcast a common back-off window size to all the users, significantly alleviating the unfairness of bandwidth utilization in conventional binary exponential back-off (BEB) algorithms. It is shown that, when maximum throughput is achieved, collision rate is almost a constant for any traffic load. In the operation of the FCR, the CU dynamically adjusts the back-off window size to keep the collision rate at a constant level for maximum throughput. Simulation results demonstrate that the unfairness of bandwidth utilization in the BEB is significantly lessened and the throughput can be maintained at e-1≈0.368 when the number of users approaches infinity. The capture effect even further improves system performance.  相似文献   

20.
HFC网络MAC协议的冲突化解算法分析与改进   总被引:2,自引:2,他引:0  
对HFC网络MAC协议注过程中的几种竞争冲突的化解算法进行分析,并提出了一种自适应P坚持算法,实验表明该算法的性能比其他可实现算法更好。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号