Results 21 to 30 of about 296,628 (229)

Design and Implementation of an Enhanced 802.11 MAC Architecture for Single-Hop Wireless Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2007
Due to its extreme simplicity and flexibility, the IEEE 802.11 standard is the dominant technology to implement both infrastructure-based WLANs and single-hop ad hoc networks.
Ralph Bernasconi   +4 more
doaj   +2 more sources

Coexistence issues for a 2.4 GHz wireless audio streaming in presence of bluetooth paging and WLAN [PDF]

open access: yesAdvances in Radio Science, 2015
Nowadays, customers expect to integrate their mobile electronic devices (smartphones and laptops) in a vehicle to form a wireless network. Typically, IEEE 802.11 is used to provide a high-speed wireless local area network (WLAN) and Bluetooth is used for
F. Pfeiffer   +3 more
doaj   +1 more source

Modulo N Backoff Scheme for Effective QoS Differentiation and Increased Bandwidth Utilization in IEEE 802.11 Networks

open access: yesJournal of Telecommunications and Information Technology, 2023
The paper presents a new modulo N channel access scheme for wireless local area networks (WLANs). The novel solution derives from the distributed coordination function (DCF) of the IEEE 802.11 standard, further elaborated as enhanced distribution ...
Tomasz Janczak   +3 more
doaj   +1 more source

Comparison of SUN and Wi-Fi P2P WSN in M2M Environments

open access: yesInternational Journal of Distributed Sensor Networks, 2015
In wireless sensor network, two scenarios are combined which involve either short-range or long-range communications. IEEE 802.15.4g and IEEE 802.11 are considered in machine to machine environments, because they can utilize the identical frequency band.
Eui-Suk Oh   +3 more
doaj   +1 more source

Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks [PDF]

open access: yes, 2015
—Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes all the nodes in the network are
Alocious, Chaminda   +2 more
core   +2 more sources

IEEE 802.11ah: A Technology to Face the IoT Challenge

open access: yesSensors, 2016
Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life.
Victor Baños-Gonzalez   +3 more
doaj   +1 more source

Исследование уязвимостей и угроз безопасности стандарта IEEE 802.11

open access: yesСовременные инновации, системы и технологии, 2023
В данной статье проводится исследование уязвимостей и угроз безопасности, связанных с широко распространенным стандартом IEEE 802.11, известным как Wi-Fi. Беспроводные сети - одна из самых интересных разработок в мире сетевых технологий. После внедрения
А. Ю. Мордвинова   +1 more
doaj   +1 more source

Buffer Sizing for 802.11 Based Networks [PDF]

open access: yes, 2011
We consider the sizing of network buffers in 802.11 based networks. Wireless networks face a number of fundamental issues that do not arise in wired networks. We demonstrate that the use of fixed size buffers in 802.11 networks inevitably leads to either
Leith, Douglas   +2 more
core   +2 more sources

Exploiting channel and interface heterogeneity for rate separating channel assignment in IEEE 802.11 wireless multimedia sensor networks

open access: yesInternational Journal of Distributed Sensor Networks, 2016
In wireless multimedia sensor networks (WMSNs), disaster control and public safety are crucial issues that focus on emergency management, rescue, and emergency medical services.
Tae-Sung Kim   +2 more
doaj   +1 more source

A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization

open access: yesApplied Sciences, 2023
Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission.
Geovani Teca, Marek Natkaniec
doaj   +1 more source

Home - About - Disclaimer - Privacy