The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision...
Secure routing is the milestone in mobile ad hoc networks. Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has a certain number of characteristics which make the security difficult. Routing is always the most significant part for...
Network flows running on a wireless mesh network (WMN) may suffer from partial failures in the form of serious throughput degradation, sometimes to the extent of starvation, because of weaknesses in the underlying MAC protocol, dissimilar physical transmission rates or different degrees of local congestion. Most existing WMN transport protocols fail to take these factors into account. This paper describes...
Collision leads to the development of retransmission algorithms for random access protocols. However their performance degrades in the case of malicious attacks. The need of a MAC protocol with the ability to identify threats and capability to discard these useless packet is required otherwise performance of shared medium may be degraded. We Focus Our Efforts on further improving the channel allocation...
Economies of scale make IEEE 802.11 an attractive technology for building wireless mesh networks (WMNs). However, the IEEE 802.11 protocol exhibits serious link-layer unfairness when used in multi-hop networks. Existing fairness solutions either do not address this problem, or require proprietary MAC protocol to provide fairness. In this paper, we argue that an ideal transport protocol should be able...
This paper presents a wideband wireless digital PHY/MAC chip which processes 90 MHz of bandwidth and integrates three fully asynchronous 802.11 a/b/g compliant modems delivering a peak data rate of 162 Mb/s. The 70.55 mm/sup 2/ IC in 0.18 /spl mu/m CMOS technology features a near-far DR of 45 dB for 54 Mb/s signals, OFDM (CCK) transmit SNR of 68 db (77 dB) and a spectrum monitor with 1.4 MHz resolution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.