Current Issue : October - December Volume : 2017 Issue Number : 4 Articles : 5 Articles
Frame resolution and physical layer (PHY) protocol type detection are the basis\nof research and development of intrusion prevention systems for IEEE\n802.11 wireless network. Aiming at the problems which cannot be solved by\nthe specifications export, this paper proposed a MAC frame analytical method\nand a PHY protocol type detection algorithm based on parsing the IEEE\n802.11 packets captured by the library Libpcap. The packet structure and the\nlength of the frame preamble (18 or 26 bytes) are presented. Then the methods\nof transforming byte-order and resolving sub-fields are given. A detection\nalgorithm of PHY protocol type is proposed based on the experiments\nand examples are given to verify these methods. This work can be a reference\nfor the R & D related to link layer frame analysis....
Recent advances in information communication technology and software have enabled mobile terminals to employ various\ncapabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile\nservices are also transferred from voice to data.Mobile terminals can access Internet for data services anytime anywhere. By using\nlocation-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment,\nit is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes\na major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network\naccess control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based\nvideo stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the\nheterogeneous wireless networks. The proposed method estimates the network status with Na�¨�±ve Bayesian Classifier and performs\nnetwork access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the\nquality of services. The efficiency of the proposed method is validated through the extensive computer simulation....
In recent years, there has been dramatic proliferation of research concerned with fifth-generation (5G) mobile communication\nnetworks, among which device-to-device (D2D) communication is one of the key technologies. Due to the intermittent connection\nof nodes, the D2D network topology may be disconnected frequently, which will lead to failure in transmission of large data files.\nIn opportunistic networks, in case of encountering nodes which never meet before a flood message blindly to cause tremendous\nnetwork overhead, a novel opportunistic network routing protocol based on social rank and intermeeting time (SRIT) is proposed\nin this paper. An improved utility approach applied in utility replication based on encounter durations and intermeeting time is\nput forward to enhance the routing efficiency. Meanwhile, in order to select better candidate nodes in the network, a social graph\namong people is established when they socially relate to each other in social rank replication. The results under the scenario show\nan advantage of the proposed opportunistic network routing based on social rank and intermeeting time (SRIT) over the compared\nalgorithms in terms of delivery ratio, average delivery latency, and overhead ratio....
The increase in the number of devices with a massive revolution in mobile\ntechnology leads to increase the capacity of the wireless communications networks.\nMulti-user Multiple-Input Multiple-Output is an advanced procedure\nof Multiple-Input Multiple-Output, which improves the performance of\nWireless Local Area Networks. Moreover, Multi-user Multiple-Input Multiple-\nOutput leads the Wireless Local Area Networks toward covering more\nareas. Due to the growth of the number of clients and requirements, researchers\ntry to improve the performance of the Medium Access Control protocol of\nMulti-user Multiple-Input Multiple-Output technology to serve the user better,\nby supporting different data sizes, and reducing the waiting time to be\nable to transmit data quickly. In this paper, we propose a Clustering Multi-\nuser Multiple-Input Multiple-Output protocol, which is an improved Medium\nAccess Control protocol for Multi-user Multiple-Input Multiple-Output\nbased on MIMOMate clustering technique and Padovan Backoff Algorithm.\nUtilizing MIMOMMate focuses on the signal power which only serves\nthe user in that cluster, minimizes the energy consumption and increases the\ncapacity. The implementation of Clustering Multi-user Multiple-Input Multiple-\nOutput performs on the Network Simulator (NS2.34) platform. The results\nshow that Clustering Multi-user Multiple-Input Multiple-Output protocol\nimproves the throughput by 89.8%, and reduces the latency of wireless\ncommunication by 43.9% in scenarios with contention. As a result, the overall\nperformances of the network are improved....
In this study, we developed network and throughput formulation models and proposed new method of the routing protocol\nalgorithm with a cross-layer scheme based on signal-to-noise ratio (SNR). This method is an enhancement of routing protocol\nad hoc on-demand distance vector (AODV). This proposed scheme uses selective route based on the SNR threshold in the reverse\nroute mechanism. We developed AODV SNR-selective route (AODV SNR-SR) for a mechanism better than AODV SNR, that is,\nthe routing protocol that used average or sum of path SNR, and also better than AODV which is hop-count-based. We also used\nselective reverse route based on SNR mechanism, replacing the earlier method to avoid routing overhead.The simulation results\nshow that AODV SNR-SR outperforms AODV SNR and AODV in terms of throughput, end-to-end delay, and routing overhead.\nThis proposed method is expected to support Device-to-Device (D2D) communications that are concerned with the quality of the\nchannel awareness in the development of the future Fifth Generation (5G)....
Loading....