Search results for "802.11"

showing 10 items of 69 documents

MAC–Engine: a new architecture for executing MAC algorithms on commodity WiFi hardware

2011

In this demo, we prove that the flexibility supported by off–the–shelf IEEE 802.11 hardware can be significantly ex- tended if we move the control of the MAC programming interface from the driver to the firmware, i.e. from the host CPU to the card CPU. To this purpose, we introduce the concept of MAC–Engine, that is an executor of Pro- grammable Finite State Machines (PFSM) implemented at the firmware level: we show how the card itself can support different protocol logics thanks to PFSM bytecode repre- sentations that can be dynamically injected inside the card memory at run-time without incurring in down time issues or network disconnect events. We provide different PFSM examples in order…

Settore ING-INF/03 - TelecomunicazioniIEEE 802.11 Programmable MAC EFSM
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

SHARP: Environment and Person Independent Activity Recognition with Commodity IEEE 802.11 Access Points

2022

In this article we present SHARP, an original approach for obtaining human activity recognition (HAR) through the use of commercial IEEE 802.11 (Wi-Fi) devices. SHARP grants the possibility to discern the activities of different persons, across different time-spans and environments. To achieve this, we devise a new technique to clean and process the channel frequency response (CFR) phase of the Wi-Fi channel, obtaining an estimate of the Doppler shift at a radio monitor device. The Doppler shift reveals the presence of moving scatterers in the environment, while not being affected by (environment-specific) static objects. SHARP is trained on data collected as a person performs seven differe…

Signal Processing (eess.SP)Networking and Internet Architecture (cs.NI)FOS: Computer and information scienceshuman activity recognitionMobile computingComputer Science - Machine LearningCFRMonitoringSensorsComputer Networks and CommunicationsIEEE 802.11acneural networksWi-Fi sensingMachine Learning (cs.LG)Computer Science - Networking and Internet ArchitectureCSIActivity recognitionFOS: Electrical engineering electronic engineering information engineeringPerformance evaluationFeature extractionWireless fidelityElectrical and Electronic EngineeringElectrical Engineering and Systems Science - Signal Processingcontactless indoor monitoringSoftware
researchProduct

Efficiency analysis of burst transmissions with block ACK in contention-based 802.11e WLANs

2005

The channel utilization efficiency of the standard 802.11 networks is severely compromised when high data transmission rates are employed, since physical layer headers and control frames are transmitted at low rate, thus wasting more channel time, proportionally. The extensions defined in the emerging 802.11e for quality-of-service (QoS) provisioning include some new mechanisms developed in order to improve the efficiency. Those include data transmission bursting (referred to as TXOP operation) and acknowledgment aggregation (referred to as block ACK). These two features allow it to offer new data transmission services, in which the data delivery and acknowledgment unit is not a single fram…

Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingPhysical layerWireless local area networks (WLAN)ThroughputThroughputbackoff algorithmIntelligent NetworkWireless lanIEEE 802.11e-2005businessData transmissionCommunication channelBlock (data storage)Computer network
researchProduct

WiSHFUL : enabling coordination solutions for managing heterogeneous wireless networks

2017

The paradigm shift toward the Internet of Things results in an increasing number of wireless applications being deployed. Since many of these applications contend for the same physical medium (i.e., the unlicensed ISM bands), there is a clear need for beyond-state-of-the-art solutions that coordinate medium access across heterogeneous wireless networks. Such solutions demand fine-grained control of each device and technology, which currently requires a substantial amount of effort given that the control APIs are different on each hardware platform, technology, and operating system. In this article an open architecture is proposed that overcomes this hurdle by providing unified programming i…

Wi-Fi arrayComputer Networks and Communicationsbusiness.industryWireless networkComputer scienceInter-Access Point ProtocolSettore ING-INF/03 - Telecomunicazioni020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessOverhead (computing)IBCNIEEE 802.11e-2005Electrical and Electronic EngineeringOpen architectureUnified programming interfaces network control radio control wishful projectbusinessIEEE 802.11sComputer network
researchProduct

A Network Protocol to Enhance Robustness in Tree-Based WSNs Using Data Aggregation

2007

This paper proposes a data gathering strategy for wireless sensor networks and an implementation based on the IEEE 802.15.4 standard. The algorithm combines the benefits of single-path and multi-path routing strategies in a hybrid solution which makes use of alternative paths when necessary. We adopt a caching and retransmission technique, which exploits some peculiar features of data aggregation, with the use of implicit acknowledgments of reception. The paper also discusses simulation results that show how the mentioned techniques, combined with exploitation of the features of the IEEE 802.15.4 standard have been used to obtain an efficient protocol that takes energy consumption into acco…

Routing protocolDynamic Source RoutingInter-Access Point ProtocolComputer scienceDistributed computingRetransmissionEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolMobile wireless sensor networkIEEE 802.11sZone Routing Protocolbusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolEnergy consumptionAd hoc wireless distribution serviceWireless sensor networksKey distribution in wireless sensor networksOptimized Link State Routing ProtocolLink-state routing protocolMultipath routingHazy Sighted Link State Routing ProtocolCommunications protocolbusinessWireless sensor networkComputer networkNeuRFon2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems
researchProduct

Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?

2007

Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless ad hoc networkNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMesh networkingThroughputNetwork topologyIEEE 802.11Packet lossNetwork performancebusinessInformation SystemsComputer networkJournal of Communications and Networks
researchProduct

What's New for QoS in IEEE 802.11?

2013

Two amendments to IEEE 802.11 have recently been published: 802.11aa and 802.11ae. Both enhance Quality of Service (QoS) provisioning in Wi-Fi networks by providing support for multicast transmission, enhanced audio video streaming, coping with inter-network interference, and improved prioritization of management frames. The proposed solutions either extend mechanisms already existing in the standard or introduce new ones. Therefore, it is important for researchers to understand the new functionalities. To this end we provide the first description of these latest mechanisms: we present the motivation behind them, explain their design principles, provide examples of usage, and comment on com…

MulticastComputer Networks and Communicationsbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniQuality of serviceQuality of ServiceProvisioningMobile QoSIEEE 802.11Hardware and ArchitectureReliable multicastIEEE 802.11e-2005Video streamingbusinessSoftwareWireless networkInformation SystemsComputer network
researchProduct

On the anomalous behavior of IEEE 802.11 commercial cards

2006

IEEE 802.11 experimental measures
researchProduct

Remarks on IEEE 802.11 DCF performance analysis

2005

This letter presents a new approach to evaluate the throughput/delay performance of the 802.11 distributed coordination function (DCF). Our approach relies on elementary conditional probability arguments rather than bidimensional Markov chains (as proposed in previous models) and can be easily extended to account for backoff operation more general than DCF's one.

Computer scienceMarkov processThroughputDistributed coordination functionCarrier-sense multiple accesssymbols.namesakeIEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitectureElectrical and Electronic EngineeringThroughput (business)IEEE 802.11Markov chainSettore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science ApplicationsComputer Science::PerformanceModeling and SimulationMultiple access controlPerformance evaluationsymbolsIEEE 802.11; Multiple access control; Performance evaluationbusinessAlgorithmComputer networkIEEE Communications Letters
researchProduct