13 resultados para IEEE 802.11i

em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Estudi realitzat a partir d’una estada al laboratori LSR (Logiciels, Systèmes, Réseaux) – IMAG a Grenoble, França, entre els mesos de setembre del 2005 i febrer del 2006. El grup de recerca Drakkar d’aquest laboratori va desenvolupar un nou mecanisme d’accés al medi per a xarxes d’àrea local sense fils (WLAN) anomenat Idle Sense. S’ha avaluat aquest mecanisme en entorns cel·lulars i s’ha comparat del seu comportament amb l’estàndard IEEE 802.11 DCF mitjançant la implementació en un simulador. En els entorns cel·lulars es troben condicions de transmissió molt allunyades de les ideals, i de les analitzades fins al moment, que consisteixen en escenaris formats per una única cel·la aïllada. Per aquest motiu, primer s’ha estudiat els mecanismes d’accés al medi d’Idle Sense en una cel·la i en condicions de transmissió adverses. Després, s’ha estudiat en entorns multicel·lulars, on les comunicacions entre estacions es veuen influenciades pel problema de solapament de cel·les i per les interferències provocades per les transmissions d’estacions d’altres cel·les. També s’ha comparat els resultats obtinguts amb el comportament d’IEEE 802.11 DCF i d’altres propostes de millora: Asymptotically Optimal Backoff (AOB) i Slow Decrease. Finalment, s’ha realitzat una modificació sobre Idle Sense, que s’ha anomenat Weighted Idle Sense, que resulta més adecuat per a treballar en xarxes d’àrea local sense fils en mode infraestructura.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aquest projecte tracta de l’estudi de la cobertura WiMAX basada en la variant 802.16-2004 en la que opera a 3.5 GHz en diferents escenaris d’un campus universitari. Primerament es realitza una introducció general a WiMAX i es defineixen els equips utilitzats. Posteriorment es comença a dur a terme un estudi de la cobertura WiMAX en diferents escenaris: indoor y outdoor per tal de poder extreure models empírics simplificats de path loss a partir de mesures realitzades amb els terminals WiMAX. Per últim, s’introdueix al projecte InterRural del Ministeri d'Indústria, Turisme i Comerç dut a terme durant els mesos Octubre 2007 - Març 2008 amb altres empreses col·laboradores: Telefònica, Hispasat, Gigle i Iber-X. La finalitat del projecte InterRural és comparar diferents tecnologies wireless de banda ample com alternatives per un bucle local ràdio de la última milla. En concret es comparen experimentalment les tecnologies WiMAX i WiFI 802.11a en diferents escenaris: LOS i NLOS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

El principal objectiu que es pretén assolir és dissenyar un simulador de la capa MAC, definida a l’estàndard IEEE 802.15.4. Convé matisar que l’objectiu no és implementar un simulador, sinó utilitzar una plataforma genèrica existent, MATLAB, i definir sobre ella, una metodologia que, permeti utilitzar-la més com a plataforma específica de desenvolupament i simulació de protocols per a xarxes de sensors, que no pas com a simple simulador.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Supported by IEEE 802.15.4 standardization activities, embedded networks have been gaining popularity in recent years. The focus of this paper is to quantify the behavior of key networking metrics of IEEE 802.15.4 beacon-enabled nodes under typical operating conditions, with the inclusion of packet retransmissions. We corrected and extended previous analyses by scrutinizing the assumptions on which the prevalent Markovian modeling is generally based. By means of a comparative study, we singled out which of the assumptions impact each of the performance metrics (throughput, delay, power consumption, collision probability, and packet-discard probability). In particular, we showed that - unlike what is usually assumed - the probability that a node senses the channel busy is not constant for all the stages of the backoff procedure and that these differences have a noticeable impact on backoff delay, packet-discard probability, and power consumption. Similarly, we showed that - again contrary to common assumption - the probability of obtaining transmission access to the channel depends on the number of nodes that is simultaneously sensing it. We evidenced that ignoring this dependence has a significant impact on the calculated values of throughput and collision probability. Circumventing these and other assumptions, we rigorously characterize, through a semianalytical approach, the key metrics in a beacon-enabled IEEE 802.15.4 system with retransmissions.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Aquest projecte proposa l'estudi en profunditat de les característiques de les xarxes WPAN 802.15.4 i de les xarxes ZigBee.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Aquest projecte es basa en l'estudi de l'oferiment de qualitat de servei en xarxes wireless i satel·litals. Per això l'estudi de les tècniques de cross-layer i del IEEE 802.11e ha sigut el punt clau per al desenvolupament teòric d’aquest estudi. Usant el simulador de xarxes network simulator, a la part de simulacions es plantegen tres situacions: l'estudi de la xarxa satel·lital, l'estudi del mètode d'accés HCCA i la interconnexió de la xarxa satel·lital amb la wireless. Encara que aquest últim punt, incomplet en aquest projecte, ha de ser la continuació per a futures investigacions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

L'objectiu d'aquest article és mostrar les característiques essencials de dos protocols de xarxes de sensors -l'estàndard 802.15.4 i el protocol ZigBee-, així com les principals amenaces a les que estan exposats. Finalment, mitjançant un cas real i, com a prova de concepte, es mostra com deixar inhabilitat un node d'una xarxa que utilitza el protocol ZigBee.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cobre Las Cruces is a renowned copper mining company located in Sevilla, with unexpected problems in wireless communications that have a direct affectation in production. Therefore, the main goals are to improve the WiFi infrastructure, to secure it and to detect and prevent from attacks and from the installation of rogue (and non-authorized) APs. All of that integrated with the current ICT infrastructure.This project has been divided into four phases, although only two of them have been included into the TFC; they are the analysis of the current situation and the design of a WLAN solution.Once the analysis part was finished, some weaknesses were detected. Subjects such as lack of connectivity and control, ignorance about installed WiFi devices and their localization and state and, by and large, the use of weak security mechanisms were some of the problems found. Additionally, due to the fact that the working area became larger and new WiFi infrastructures were added, the first phase took more time than expected.As a result of the detailed analysis, some goals were defined to solve and it was designed a centralized approach able to cope with them. A solution based on 802.11i and 802.1x protocols, digital certificates, a probe system running as IDS/IPS and ligthweight APs in conjunction with a Wireless LAN Controller are the main features.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It is well known that multiple-input multiple-output (MIMO) techniques can bring numerous benefits, such as higher spectral efficiency, to point-to-point wireless links. More recently, there has been interest in extending MIMO concepts tomultiuser wireless systems. Our focus in this paper is on network MIMO, a family of techniques whereby each end user in a wireless access network is served through several access points within its range of influence. By tightly coordinating the transmission and reception of signals at multiple access points, network MIMO can transcend the limits on spectral efficiency imposed by cochannel interference. Taking prior information-theoretic analyses of networkMIMO to the next level, we quantify the spectral efficiency gains obtainable under realistic propagation and operational conditions in a typical indoor deployment. Our study relies on detailed simulations and, for specificity, is conducted largely within the physical-layer framework of the IEEE 802.16e Mobile WiMAX system. Furthermore,to facilitate the coordination between access points, we assume that a high-capacity local area network, such as Gigabit Ethernet,connects all the access points. Our results confirm that network MIMO stands to provide a multiple-fold increase in spectralefficiency under these conditions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Multiple-input multiple-output (MIMO) techniques have become an essential part of broadband wireless communications systems. For example, the recently developed IEEE 802.16e specifications for broadband wireless access include three MIMOprofiles employing 2×2 space-time codes (STCs), and two of these MIMO schemes are mandatory on the downlink of Mobile WiMAX systems. One of these has full rate, and the other has full diversity, but neither of them has both of the desired features. The third profile, namely, Matrix C, which is not mandatory, is both a full rate and a full diversity code, but it has a high decoder complexity. Recently, the attention was turned to the decodercomplexity issue and including this in the design criteria, several full-rate STCs were proposed as alternatives to Matrix C. In this paper, we review these different alternatives and compare them to Matrix C in terms of performances and the correspondingreceiver complexities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ADSL is becoming the standard form of residential and small-business broadband Internet access due to, primarily, its low deployment cost. These ADSL residential lines are often deployed with 802.11 Access Points (AP) that providewireless connectivity. Given the density of ADSL deployment, it is often possible for a residential wireless client to be in range of several other APs, belonging to neighbors, with ADSL connectivity. While the ADSL technology has showed evident limits in terms of capacity (with speeds ranging 1-10 Mbps), the short-range wireless communication can guarantee a muchhigher capacity (up to 20 Mbps). Furthermore, the ADSL links in the neighborhood are generally under-utilized, since ADSL subscribers do not connect 100% of the time. Therefore, it is possible for a wireless client to simultaneously connect to several APs in range and effectively aggregate their available ADSL bandwidth.In this paper, we introduce ClubADSL, a wireless client that can simultaneously connect to several APs in range on different frequencies and aggregate both their downlink and uplink capacity. ClubADSL is a software that runs locally on the client-side, and it requires neither modification to the existing Internet infrastructure, nor any hardware/protocol upgradesto the 802.11 local area network. We show the feasibility of ClubADSL in seamlessly transmitting TCP traffic, and validate its implementation both in controlled scenarios and with current applications over real ADSL lines. In particular we show that a ClubADSL client can greatly benefit from the aggregated download bandwidth in the case of server-client applications such as video streaming, but can also take advantage of the increased upload bandwidth greatly reducing download times with incentive-based P2P applications such as BitTorrent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although some projects and most LMS still rely on IEEE LOM, this standard is not yet an option. We suggest some lessons to learn.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.