• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 264,973
Next 10 →

A Microscopic Study of Power Management in IEEE 802.11 Wireless Networks

by Chunyu Hu, Rong Zheng, Jennifer C. Hou, Lui Sha
"... IEEE 802.11 power saving mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power management decisions to wake up wireless devices or put them to sleep states are made periodically in every beacon interva ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
IEEE 802.11 power saving mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power management decisions to wake up wireless devices or put them to sleep states are made periodically in every beacon

A Microscopic Study of Power Management in IEEE 802.11 Wireless Networks

by unknown authors
"... Abstract — IEEE 802.11 power saving mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power management decisions to wake up wireless devices or put them to sleep states are made periodically in every beac ..."
Abstract - Add to MetaCart
Abstract — IEEE 802.11 power saving mode (PSM) has been proposed in wireless LANs and multi-hop wireless networks to coordinate power states of wireless devices. In IEEE 802.11 PSM, power management decisions to wake up wireless devices or put them to sleep states are made periodically in every

Link-level Measurements from an 802.11b Mesh Network

by Daniel Aguayo, John Bicket, Sanjit Biswas, Glenn Judd, Robert Morris - In SIGCOMM , 2004
"... This paper anal yzes the causes of packetl oss in a 38-node urban mul ti-hop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of inter-n ..."
Abstract - Cited by 565 (11 self) - Add to MetaCart
This paper anal yzes the causes of packetl oss in a 38-node urban mul ti-hop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of inter

Intercepting Mobile Communications: The Insecurity of 802.11

by Nikita Borisov, Ian Goldberg, David Wagner , 2001
"... The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives. T ..."
Abstract - Cited by 438 (2 self) - Add to MetaCart
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives

Performance Anomaly of 802.11b

by Martin Heusse, Franck Rousseau, Gilles Berger-sabbatel, Andrzej Duda - In IEEE INFOCOM , 2003
"... Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks in which ..."
Abstract - Cited by 419 (11 self) - Add to MetaCart
Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks

Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment

by Laura Marie Feeney, Martin Nilsson - In IEEE Infocom , 2001
"... Energy-aware design and evaluation of network protocols requires knowledge of the energy consumption behavior of actual wireless interfaces. But little practical information is available about the energy consumption behavior of well-known wireless network interfaces and device specifications do not ..."
Abstract - Cited by 655 (3 self) - Add to MetaCart
not provide information in a form that is helpful to protocol developers. This paper describes a series of experiments which obtained detailed measurements of the energy consumption of an IEEE 802.11 wireless network interface operating in an ad hoc networking environment. The data is presented as a

An Energy-Efficient MAC Protocol for Wireless Sensor Networks

by Wei Ye, John Heidemann, Deborah Estrin , 2002
"... This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract - Cited by 1488 (37 self) - Add to MetaCart
wireless MACs such as IEEE 802.11 in almost every way: energy conservation and self-configuration are primary goals, while per-node fairness and latency are less important. S-MAC uses three novel techniques to reduce energy consumption and support self-configuration. To reduce energy consumption

Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit

by Frederico Calì, Marco Conti, Enrico Gregori - IEEE/ACM TRANSACTIONS ON NETWORKING , 2000
"... In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we analytically ..."
Abstract - Cited by 434 (12 self) - Add to MetaCart
In wireless LANs (WLANs), the medium access control (MAC) protocol is the main element that determines the efficiency in sharing the limited communication bandwidth of the wireless channel. In this paper we focus on the efficiency of the IEEE 802.11 standard for WLANs. Specifically, we

SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks

by Paramvir Bahl, Ranveer Chandra - in IEEE 802.11 Ad-Hoc Wireless Networks,” in ACM Mobicom , 2004
"... Capacity improvement is one of the principal challenges in wireless networking. We present a link-layer protocol called Slotted Seeded Channel Hopping, or SSCH, that increases the capacity of an IEEE 802.11 network by utilizing frequency diversity. SSCH can be implemented in software over an IEEE 80 ..."
Abstract - Cited by 346 (3 self) - Add to MetaCart
Capacity improvement is one of the principal challenges in wireless networking. We present a link-layer protocol called Slotted Seeded Channel Hopping, or SSCH, that increases the capacity of an IEEE 802.11 network by utilizing frequency diversity. SSCH can be implemented in software over an IEEE

Wireless sensor networks: a survey

by I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci , 2002
"... This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of fact ..."
Abstract - Cited by 1936 (23 self) - Add to MetaCart
This paper describes the concept of sensor networks which has been made viable by the convergence of microelectro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review
Next 10 →
Results 1 - 10 of 264,973
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University