712 research outputs found

    Reverse Direction Transmission in Wireless Networks: Review

    Get PDF
    Reverse direction mechanism is a promising significant development that may lead to promoting the accuracy of TXOP. The transfer, in conventional TXOP operation, is one way direction out of the station which holds the TXOP and which is not applied to some network services using two lane traffic namely VoIP and on-line gaming. Therefore, the conventional TXOP operation enhances only the forward direction transfer, but not the reverse direction transfer. Moreover, reverse direction mechanism makes it possible for the holder of TXOP to reserve unused TXOP time for its receivers which may improve the channel utilization as well as the performance of reverse direction traffic flows. It is well-known that the reverse direction transfer scheme aims mainly to improve the effectiveness and that plays a key role in reducing the overhead and increasing the system throughput. Thus, this paper provides an overview of a research progress in reverse direction transmission scheme over high speed wireless LANs. Moreover, it addresses the reverse direction mechanism that has been proposed for the next generation wireless networks and the ones adopted by IEEE 802.11n standard. Furthermore, it stresses the reverse issues that require to be dealt with in order to bring further progress to the reverse direction transmission

    Design a Novel Reverse Direction Transmission Using Piggyback and Piggyback With Block ACK to Improving the Performance of MAC Layer Based on Very High Speed Wireless LANs

    Get PDF
    A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the sender’s time of period to avoid the retransmission at sender and send a piggyback frame (ACK+data) this called piggybacking. Piggyback with block ACK represented in multi data send from side A to B with block ACK request (BAR), side B send block ACK (BA) piggybacking with multi data to side A, this called piggybacking with block ACK. In our scheme here we want to propose a novel reverse direction transmission using piggyback and piggyback with block ACK which is divided each data frame send and receive into subframes and send each subframe separately, if there is an error happened during the transmission only retransmission the corrupted subframe instead of whole frame. We want to implement this work in NS2 simulator. The research contributions are summarized and the piggyback schemes that need to be investigated via high speed wireless LANs are also highlighted

    Medium access control and network planning in wireless networks

    Get PDF
    Wireless Local Area Networks (WLANs) and Wireless Metropolitan Area Networks (WMANs) are two of the main technologies in wireless data networks. WLANs have a short range and aim at providing connectivity to end users. On the other hand, WMANs have a long range and aim at serving as a backbone network and also at serving end users. In this dissertation, we consider the problem of Medium Access Control (MAC) in WLANs and the placement of Relay Stations (RSs) in WMANs. We propose a MAC scheme for WLANs in which stations contend by using jams on the channel. We present analytic and simulation results to find the optimal parameters of the scheme and measure its performance. Our scheme has a low collision rate and delay and a high throughput and fairness performance. Secondly, we present a MAC scheme for the latest generation of WLANs which have very high data rates. In this scheme, we divide the stations into groups and only one station from each group contends to the channel. We also use frame aggregation to reduce the overhead. We present analytic and simulation results which show that our scheme provides a small collision rate and, hence, achieves a high throughput. The results also show that our scheme provides a delay performance that is suitable for real-time applications and also has a high level of fairness. Finally, we consider the problem of placing Relay Stations (RSs) in WMANs. We consider the Worldwide Interoperability for Microwave Access (WIMAX) technology. The RSs are used to increase the capacity of the network and to extend its range. We present an optimization formulation that places RSs in the WiMAX network to serve a number of customers with a pre-defined bit rate. Our solution also provides fault-tolerance by allowing one RS to fail at a given time so that the performance to the users remains at a predictable level. The goal of our solution is to meet the demands of the users, provide fault-tolerance and minimize the number of RSs used

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    Advanced Wireless LAN

    Get PDF
    The past two decades have witnessed starling advances in wireless LAN technologies that were stimulated by its increasing popularity in the home due to ease of installation, and in commercial complexes offering wireless access to their customers. This book presents some of the latest development status of wireless LAN, covering the topics on physical layer, MAC layer, QoS and systems. It provides an opportunity for both practitioners and researchers to explore the problems that arise in the rapidly developed technologies in wireless LAN

    Energy-efficient wireless communication

    Get PDF
    In this chapter we present an energy-efficient highly adaptive network interface architecture and a novel data link layer protocol for wireless networks that provides Quality of Service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations in bandwidth scheduling and error control are necessary to achieve energy efficiency and an acceptable quality of service. In our approach we apply adaptability through all layers of the protocol stack, and provide feedback to the applications. In this way the applications can adapt the data streams, and the network protocols can adapt the communication parameters
    • …
    corecore