4,394 research outputs found

    Adaptive delayed channel access for IEEE 802.11n WLANs

    Get PDF
    Abstract— In this paper we investigate potential benefits that an adaptive delayed channel access algorithm can attain for the next-generation wireless LANs, the IEEE 802.11n. We show that the performance of frame aggregation introduced by the 802.11n adheres due to the priority mechanism of the legacy 802.11e EDCA scheduler, resulting in a poor overall performance. Because high priority flows have low channel utilization, the low priority flows throughputs can be amerced further. By introducing an additional delay at the MAC layer, before the channel access scheduling, it will retain aggregate sizes at higher numbers and consequently a better channel utilization. Also, in order to support both UDP and TCP transport layer protocols, the algorithm’s operational conditions are kept adaptive. The simulation results demonstrate that our proposed adaptive delayed channel access outperforms significantly the current 802.11n specification and non-adaptive delayed channel access

    Adaptive medium access control for VoIP services in IEEE 802.11 WLANs

    Get PDF
    Abstract- Voice over Internet Protocol (VoIP) is an important service with strict Quality-of-Service (QoS) requirements in Wireless Local Area Networks (WLANs). The popular Distributed Coordination Function (DCF) of IEEE 802.11 Medium Access Control (MAC) protocol adopts a Binary Exponential Back-off (BEB) procedure to reduce the packet collision probability in WLANs. In DCF, the size of contention window is doubled upon a collision regardless of the network loads. This paper presents an adaptive MAC scheme to improve the QoS of VoIP in WLANs. This scheme applies a threshold of the collision rate to switch between two different functions for increasing the size of contention window based on the status of network loads. The performance of this scheme is investigated and compared to the original DCF using the network simulator NS-2. The performance results reveal that the adaptive scheme is able to achieve the higher throughput and medium utilization as well as lower access delay and packet loss probability than the original DCF

    Dynamic miRNA–mRNA paradigms: New faces of miRNAs

    Get PDF
    AbstractMore and more evidences suggested that the flow of genetic information can be spatially and temporally regulated by non-coding RNAs (ncRNAs), such as microRNAs (miRNAs). Although biogenesis and function of miRNAs have been well detailed, elucidation of the dynamic interplays between miRNAs and mRNAs have just begun. Here, we highlighted that the miRNA–mRNA interactions which could take place in different cellular locations. During dynamic interactions, miRNA binding sites included not only 3′UTRs, but also 5′UTRs and CDSs. Under different physiological or pathological conditions, miRNAs could switch from translational inhibition to activation. Dynamic miRNA–mRNA paradigms which suggested a novel tip of the iceberg beneath the gene regulation network will provide clues for function studies of other ncRNAs

    Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Get PDF
    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system
    • …
    corecore