6,438 research outputs found

    A Delayed-ACK Scheme for Performance Enhancement of Wireless LANs

    Get PDF
    The IEEE 802.11 MAC protocol provides a reliable link layer using Stop & Wait ARQ. The cost for high reliability is the overhead due to acknowledgement packets in the direction opposite to the actual data flow. In this paper, the design of a new protocol as an enhancement of IEEE 802.11 is proposed, with the aim of reducing supplementary traffic overhead in order to increase the bandwidth available for actual data transmission. The performance of the proposed protocol is evaluated through comparison with IEEE 802.11 as well as with a SSCOP-based protocol. Results underline significant advantages of the proposed protocol against existing ones, thus confirming the value and potentiality of the approach

    Model checking medium access control for sensor networks

    Get PDF
    We describe verification of S-MAC, a medium access control protocol designed for wireless sensor networks, by means of the PRISM model checker. The S-MAC protocol is built on top of the IEEE 802.11 standard for wireless ad hoc networks and, as such, it uses the same randomised backoff procedure as a means to avoid collision. In order to minimise energy consumption, in S-MAC, nodes are periodically put into a sleep state. Synchronisation of the sleeping schedules is necessary for the nodes to be able to communicate. Intuitively, energy saving obtained through a periodic sleep mechanism will be at the expense of performance. In previous work on S-MAC verification, a combination of analytical techniques and simulation has been used to confirm the correctness of this intuition for a simplified (abstract) version of the protocol in which the initial schedules coordination phase is assumed correct. We show how we have used the PRISM model checker to verify the behaviour of S-MAC and compare it to that of IEEE 802.11

    Using multiple metrics for rate adaptation algorithms in IEEE 802.11 WLANs

    Get PDF

    Denial of service attacks and challenges in broadband wireless networks

    Get PDF
    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions

    CARLA: combining Cooperative Relaying and Link Adaptation for IEEE 802.11 wireless networks

    Get PDF
    • 

    corecore