Academic literature on the topic 'IEEE 80211 (Standard)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IEEE 80211 (Standard).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IEEE 80211 (Standard)"

1

Kumar, M. Anil, and Dr V. Srikanth Dr. V. Srikanth. "Survey of IEEE 802.11 Standards." International Journal of Scientific Research 2, no. 3 (June 1, 2012): 111–14. http://dx.doi.org/10.15373/22778179/mar2013/36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oktaviana, Ana, Doan Perdana, and Ridha Muldina Negara. "Performance Analysis on IEEE 802.11ah Standard with Enhanced Distributed Channel Access Mechanism." CommIT (Communication and Information Technology) Journal 12, no. 1 (May 31, 2018): 35. http://dx.doi.org/10.21512/commit.v12i1.3908.

Full text
Abstract:
IEEE 802.11ah is a new task group on the IEEE 802.11 standard designed to work on the 900 MHz. It is with a range of communication coverage up to 1kilometer, lower energy consumption, and up to 8191 stations. There are two types of STAs in 802.11ah: sensor type to support sensor service and non-sensor type for offload service. In this research, it only focuses on non-sensor STA. For non-sensor STA, maximizing throughput is more important than power consumption. This research aims to see the performance of IEEE 802.1 1ah with Enhanced Distributed Channel Access (EDCA). To achieve that purpose, a mechanism is needed to provide guarantees various services required by theSTA. EDCA is an access mechanism used to set the Quality of Service (QoS) for the IEEE 802.11 standard through modifications in MAC layer. In this research,it focuses on one of the EDCA parameters, Arbitration Inter-Frame Space (AIFS). In addition, this research also focuses on the 802.11ah feature is Restricted Access Window (RAW) by changing the number of the RAW groups. From the results of the research, it is found that the improvement scheme with Arbitration Inter-Frame Space Number (AIFSN) value AC BK = 2, AC BE = 1, AC VI = 1, AC VO = 1 has better performance compared to the default scheme with AIFSN value AC BK = 7, AC BE = 3, AC VI = 2, AC VO = 2) with an average throughput of 1.504598 Mbps, average overall delay of 0.066242 second and average PDR of 62%. In addition, changes in the number of RAW groups and RAW slots affect network performance. This feature can improve the value of throughput, average delay, and Packet Delivery Ratio. The goals of this research is to know the effect of AIFSN value changes on AIFSN parameters, variation of RAW group and RAW slot number to throughput,average delay and packet delivery ratio.
APA, Harvard, Vancouver, ISO, and other styles
3

Tabeidi, Rania A., and Samia M. Masaad. "Survey and Analysis of the Evolution of Wireless Security in IEEE 802.11 Standards using Advanced Encryption Standard (AES)." Circulation in Computer Science 2, no. 10 (November 20, 2017): 1–7. http://dx.doi.org/10.22632/ccs-2017-252-01.

Full text
Abstract:
The aim of this paper is to survey , analyze and evolution wireless security in IEEE 802.11 standards at the physical layer levels, to hold a fair comparison among the different WLAN security algorithms, and theoretical background of cryptography, and survey implementation Advanced Encryption Standard Algorithm (AES) -128, AES-192 and AES-256 using matlab7.
APA, Harvard, Vancouver, ISO, and other styles
4

Natkaniec, Marek. "Ewolucja sieci bezprzewodowych standardu ieee 802.11." PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE 1, no. 4 (April 5, 2015): 18–25. http://dx.doi.org/10.15199/59.2015.4.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ranganathan, Radha, and Kathiravan Kannan. "Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks." Scientific World Journal 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/680681.

Full text
Abstract:
IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance.
APA, Harvard, Vancouver, ISO, and other styles
6

Lu, Yuteng, and Meng Sun. "Modeling and Verification of IEEE 802.11i Security Protocol in UPPAAL for Internet of Things." International Journal of Software Engineering and Knowledge Engineering 28, no. 11n12 (November 2018): 1619–36. http://dx.doi.org/10.1142/s021819401840020x.

Full text
Abstract:
IEEE 802.11i is the IEEE standard that provides enhanced MAC security and has been widely used in wireless networks and Internet of Things. It improves IEEE 802.11 (1999) by providing a Robust Security Network (RSN) with two new protocols: the Four-Way Handshake and the Group Key Handshake. These protocols utilize the authentication services and port access control described in IEEE 802.1X to establish and change the appropriate cryptographic keys. In this paper, we carry out a formal modeling and verification approach based on timed automata for IEEE 802.11i protocol, using the UPPAAL model checker, to check correctness of the changes in IEEE 802.11i protocol and provide better security.
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Chun, Xian Hua Dai, Zheng Jie Deng, and Shu Qian He. "A Novel Delay Model for IEEE 802.11." Applied Mechanics and Materials 263-266 (December 2012): 1032–36. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1032.

Full text
Abstract:
With the popularity of the IEEE 802.11 standards, many analytical delay studies for the Distributed Coordination Function (DCF) have been reported. In this paper, we analyze the additional idle durations that a tagged node needs to wait due to other nodes transmissions. Separating the distributed inter-frame space (DIFS) and extended inter-frame space (EIFS) durations from the full time of a successful transmission, we provide a correct function analysis of the DIFS and EIFS durations and build a more accurate delay model for the IEEE 802.11 DCF. The theoretical analysis and simulation results prove that the proposed delay model is coincident with the real performance when the node number increases.
APA, Harvard, Vancouver, ISO, and other styles
8

Rasul, Ababakr Ibrahim, and Diyar Salah Fadhil. "Enhancement of quality of service (QoS) in IEEE 802.11." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 11 (August 23, 2016): 7241–42. http://dx.doi.org/10.24297/ijct.v15i11.4363.

Full text
Abstract:
Today everyone is living in a gold rush of wireless communication worldwide. If we look around, we will find wireless communication happening everywhere. In our home, small routers are providing us with wireless access to the internet in offices, shopping centers, cafes, universities, and so on. In this article, a mechanism has been introduced by combining service differentiation and packet aggregation in IEEE 802.11-based WMNs. The result is IEEE802.11b is the most reliable standard among all other wireless standards. Changes required in modulation techniques so that their overhead can be decreased and data can travel in more effective and efficient way.
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Er-hua, and Yu Chen. "Multi-Layer Wireless Perception and Recognition Technology Based on Internet of Things." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 01 (January 17, 2019): 31. http://dx.doi.org/10.3991/ijoe.v15i01.9776.

Full text
Abstract:
To study the multi-layered wireless sensation and recognition technology of the Internet of Things, the background and research status at home and abroad were summarized. An IoT system architecture based on a multi-layer multi-reader passive network and a technology for simultaneous simulation of multiple network standards based on OMNeT++ were proposed. The proportion of the time consumption of each communication phase in the entire communication process was analyzed in detail. A variety of strategies for shortening the system delay were proposed. At the same time, multiple network standard protocol stacks were divided and modeled. Dual-layer networks based on IEEE 802.11 and IEEE 802.15.4a were verified as examples. The results showed that the length of the hop sequence and the number of readers were optimized. Therefore, this method is effective.
APA, Harvard, Vancouver, ISO, and other styles
10

Fapohunda, Kofoworola, Eberechukwu Numan Paulson, Zubair Suleiman, Oladimeji Saliu, David Michael, and Kamaludin Mohammed Yusof. "Application of Bat Algorithm for The Detection of Hidden Nodes in IEEE802.11ah Networks." ELEKTRIKA- Journal of Electrical Engineering 18, no. 1 (April 24, 2019): 11–15. http://dx.doi.org/10.11113/elektrika.v18n1.129.

Full text
Abstract:
Hidden node problem sometimes referred to as frequent packets collision that mostly leads to loss of packets is no longer new in wireless networks because it affects the previous IEEE802.11 standards. The new IEEE802.11ah standard which is also a sub-standard of IEEE 802.11 is no exemption. As a matter of fact, IEEE802.11ah suffers from a hidden node problem more than networks (IEEE 802.11a/b/n/ac) due to their wider coverage which is up to 1km, high number of devices they can support (over 8000 nodes to one AP) and frequent simultaneous sleeping and sending of the nodes (power saving mode). A few researchers have worked on this hidden node problem in IEEE802.11ah but could not get a lasting solution to it. Therefore, this paper proposes an algorithm which detects hidden nodes and also proposes a theoretical solution based on previous works which was also experimentally verified through the BIHD-CM.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IEEE 80211 (Standard)"

1

Boom, Derrick D. "Denial of service vulnerabilities in IEEE 802.16 wireless networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBoom.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chan, Hsiung Wei Roy. "Performance analysis of IEEE 802.11A signals under different operational environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FChan.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Tri T. Ha, Randy L. Borchardt. Includes bibliographical references (p. 89). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Baalaji, Venkateshwaraiyer S. "Wireless tool kit for hand held devices." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FBaalaji%5FCS.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ozan, Orhan. "Denial of service attacks on 802.1X security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Russo, Joseph Anthony. "Test and evaluation of meshdynamics 802.11 multi-radio mesh modules in support of coalition riverine operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FRusso.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Command, Control and Communications (C3)))--Naval Postgraduate School, June 2006.
Thesis Advisor(s): James Ehlert. "June 2006." Includes bibliographical references (p.199-201). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Baalaji, Venkateshwaraiyer S. "Collaborative services in an ad hoc wireless network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FBaalaji%5FITM.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Alex Bordetsky, Gurminder Singh. Includes bibliographical references (p. 71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Manso, Rogerio C. "Performance analysis of M-QAM with Viterbi soft-decision decoding." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FManso.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lowham, Keith D. "Synchronization analysis and simulation of a standard IEEE 802.11g OFDM signal." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1652.

Full text
Abstract:
Approved for public release, distribution is unlimited
Synchronization of orthogonal frequency-division multiplexed (OFDM) signals is significantly more difficult than synchronization of a single-carrier system. The recently approved IEEE Standard 802.11g specifies a packet-based OFDM system that provides a basis for the discussion of OFDM synchronization in a packet-based environment. Algorithms that synchronize the receiver carrier demodulation frequency and phase, the data frame, the OFDM symbol timing, and the data symbol timing are discussed and analyzed in an AWGN channel. System View simulation is used to implement the frame and carrier frequency synchronization algorithms, where the performance of these algorithms is analyzed and they are shown to be useful detection algorithms for Standard 802.11g signal reception.
Lieutenant Commander, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
9

Munoz, Ramon J., and Robert J. Guice. "IEEE 802.16 Commercial Off The Shelf (COTS) technologies as a compliment to Ship To Objective Maneuver (STOM) communications." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1417.

Full text
Abstract:
Approved for public release; distribution is unlimited.
This research evaluates the IEEE 802.16 standards and technologies that are currently being developed in the commercial sector. The robust capability of this standard lends itself potentially to numerous military applications. This research explores how this technology might address the shortcomings of existing military radio and data systems; specifically, with respect to the issues surrounding the Ship to Objective Maneuver (STOM) communications. The intent of this research is to provide recommendations on the necessary 'adapt from COTS' changes for this technology to address STOM networking requirements. This research includes discussions on the military requirements for an IEEE 802.16 adapted waveform. The requirements are for the IEEE 802.16 'adapt from COTS' are derived from researched on the Concept of Employment for STOM operations and the specification of the Joint Tactical Radio Systems (JTRS) Wideband Networking Waveform (WNW). These discussions offer an illustration of the complex networking demands the COTS adapted systems would need to address. Through detailed exploration of the current IEEE 802.16 standards and implementation testing with pre-standard IEEE 802.16a equipment, we were able to make recommendations on the COTS adaptations necessary to make IEEE 802.16 suitable as a complimentary technology within the STOM scenario.
Captain, United States Marine Corps
APA, Harvard, Vancouver, ISO, and other styles
10

Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IEEE 80211 (Standard)"

1

Ajluni, Cheryl J. Forging consensus: --the inside story of the development of IEEE 802.11. New York: IEEE Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wireless communication standards: A study of IEEE 802.11, 802.15, and 802.16. New York: Standards Information Network, IEEE Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johathan, Leary, ed. 802.11 Wireless LAN fundamentals. Indianapolis, IN: Cisco, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Holt, Alan. 802.11 wireless networks: Security and analysis. London: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Geier, James T. Designing and deploying 802.11n wireless networks. Indianapolis, Ind: Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bob, Fleck, ed. 802.11 Security. Sebastopol, Calif: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Telecom crash course. 2nd ed. New York: McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Telecom crash course. New York: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shepard, Steven. Telecom Crash Course. New York: McGraw-Hill, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Steven, Shepard. Telecom Crash Course. New York: McGraw-Hill, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IEEE 80211 (Standard)"

1

Könsgen, Andreas. "The IEEE 802.11 Standard Series." In Design and Simulation of Spectrum Management Methods for Wireless Local Area Networks, 5–48. Wiesbaden: Vieweg+Teubner Verlag, 2010. http://dx.doi.org/10.1007/978-3-8348-9738-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mammadov, F. H., and M. Y. Orudjova. "Analytical Models of WLAN Standard IEEE 802.11." In Recent Developments and New Direction in Soft-Computing Foundations and Applications, 469–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32229-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Acquaviva, Andrea, Edoardo Bontà, and Emanuele Lattanzi. "Dynamic Power Management Strategies Within the IEEE 802.11 Standard." In Lecture Notes in Computer Science, 190–214. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11419822_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jakobs, Kai. "How People and Stakeholders Shape Standards: The Case of IEEE 802.11." In Lecture Notes in Business Information Processing, 1–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22810-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Junghoon, Mikyung Kang, Yongmoon Jin, Gyungleen Park, and Hanil Kim. "Design of an Efficient Error Control Scheme for Time-Sensitive Application on the Wireless Sensor Network Based on IEEE 802.11 Standard." In Distributed Computing – IWDC 2005, 355–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11603771_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"IEEE Standard 802.11 Overview." In Wireless Local Area Networks Quality of Service, 65–96. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118098905.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"The IEEE Standard for WLAN: IEEE 802.11." In Wireless Communication Standards, 45–132. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9781118098837.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"The IEEE 802.11 Standards." In Voice Over WLANS, 349–56. Elsevier, 2008. http://dx.doi.org/10.1016/b978-075068299-2.50018-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"IEEE 802.11 Standard and Amendments." In CWNA: Certified Wireless Network Administrator Study Guide, 35–68. Indianapolis, Indiana: John Wiley & Sons, Inc., 2018. http://dx.doi.org/10.1002/9781119549406.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lemstra, W., and V. Hayes. "The Shaping of the IEEE 802.11 Standard." In Information Communication Technology Standardization for E-Business Sectors, 98–126. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-320-3.ch008.

Full text
Abstract:
In this chapter the authors explore and describe the role of the innovating firm in relation to the standards making process of Wireless-Local Area Networks, and in particular the link between NCR and its corporate successors in the creation of the IEEE 802.11 standard, which is at the basis of the global success of Wi-Fi. Their focus is the leadership role assumed by NCR c.s. responsible for the initiation and creation of an open standard for Wireless-LANs.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IEEE 80211 (Standard)"

1

Betiol Júnior, José Roque, Robson Costa, Luciana Rech, and Ricardo Moraes. "Avaliação experimental do protocolo RT-WiFi em ambientes abertos." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7351.

Full text
Abstract:
Networks known as WiFi (IEEE 802.11 standard) are widely used in applications ranging from simple home environments systems to complex control systems network. However, the extensions incorporated into the standard to provide Quality of Service (QoS) are still unable to guarantee time constraints for real-time (RT) communications requirements. This paper presents an experimental validation of the RT-WiFi protocol that was recently proposed and analyzed through simulation. The experimental results demonstrate the feasibility of implementing the RT-WiFi protocol and improving the QoS level of communications through a comparative analysis with the EDCA mechanism, which is a mechanism incorporated in the IEEE 802.11 standard to provide different levels of transmission priority of different types of traffic.
APA, Harvard, Vancouver, ISO, and other styles
2

Hamid Reza Afrancheh and Abolfazl Toroghi Hag. "Adaptive controlling of IEEE 802.16 WiMAX standard and IEEE 802.11 Wireless LAN Networks standard." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5563802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, M. L., S. Lee, and S. C. Park. "An Adaptive Energy Efficient System within IEEE 802.11 Standard." In The 9th International Conference on Advanced Communication Technology. IEEE, 2007. http://dx.doi.org/10.1109/icact.2007.358783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bachan, P., and Brahmjit Singh. "Performance evaluation of authentication protocols for IEEE 802.11 standard." In 2010 International Conference on Computer and Communication Technology (ICCCT). IEEE, 2010. http://dx.doi.org/10.1109/iccct.2010.5640384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dolinska, Iwona, Mariusz Jakubowski, and Antoni Masiukiewicz. "New IEEE 802.11 HEW Standard Throughput per User Analysis." In 2019 International Conference on Information and Digital Technologies (IDT). IEEE, 2019. http://dx.doi.org/10.1109/dt.2019.8813700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sanabria-Russo, Luis, Azadeh Faridi, Boris Bellalta, Jaume Barcelo, and Miquel Oliver. "Future evolution of CSMA protocols for the IEEE 802.11 standard." In 2013 ICC - 2013 IEEE International Conference on Communication Workshop (ICC). IEEE, 2013. http://dx.doi.org/10.1109/iccw.2013.6649433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hans, Shifali, and Anand Nayyar. "A Review of De-Facto MAC Standard: IEEE 802.11 DCF." In 2014 Fourth International Conference on Advanced Computing & Communication Technologies (ACCT). IEEE, 2014. http://dx.doi.org/10.1109/acct.2014.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, David Q., and Mark Coslow. "Extensible authentication protocols for IEEE standards 802.11 and 802.16." In the International Conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1506270.1506330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Hyung-Taek, Daniel Herrscher, Martin Waltl, and Firas Chaari. "Performance Analysis of the IEEE 802.1 Ethernet Audio/Video Bridging Standard." In Fifth International Conference on Simulation Tools and Techniques. ACM, 2012. http://dx.doi.org/10.4108/icst.simutools.2012.247747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography