Search results for "Area network"

showing 10 items of 74 documents

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct

Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets

2013

Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…

Full virtualizationHardware virtualizationNetwork packetComputer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniDistributed computingLocal area networkNetwork virtualizationVirtualizationcomputer.software_genreUploadNetwork performancebusinesscomputerComputer networkCognitive network wireless internet mac layer
researchProduct

The effect of body shape and gender on wireless Body Area Network on-body channels

2010

Technological advancements have made possible the emergence of Body Area Networks (BANs). There are numerous on-body channel characterizations in the literature performed on a phantom or a single human subject. In this paper, using multiple subjects, we consider the effect of body shape and gender on the on-body channel. A characterization of a narrowband on-body to on-body channel among different subjects is presented. The paper investigates the relationship between the propagation and the subject's physical characteristics. The investigation is performed at 2360 MHz; the new medical band undergoing FCC approval. Our results show that the path loss in women is less than that in men and the…

GeographyNarrowbandSettore ING-INF/03 - TelecomunicazioniStatisticsBody area networkElectronic engineeringPath lossFadingAntenna measurements Antennas and propagation Body area networks Channel models Fading Shape Wireless sensor networks Body Area Networks Body shape Channel characterization Channel propagation IEEE802.15.6. Wireless Sensor NetworksWireless sensor networkImaging phantomRice distributionCommunication channel
researchProduct

Revisit of RTS/CTS Exchange in High-Speed IEEE 802.11 Networks

2005

IEEE 802.11 medium access control (MAC), called distributed coordination function (DCF), provides two different access modes, namely, 2-way (basic access) and 4-way (RTS/CTS) handshaking. The 4-way handshaking has been introduced in order to combat the hidden terminal phenomenon. It has been also proved that such a mechanism can be beneficial even in the absence of hidden terminals, because of the collision time reduction. We analyze the effectiveness of the RTS/CTS access mode, in current 802.11b and 802.11a networks. Since the rates employed for control frame transmissions can be much lower than the rate employed for data frames, the assumption on the basis of the 4-way handshaking introd…

Hidden node problembusiness.industryComputer scienceReal-time computingFrame (networking)Wireless local area networks (WLAN)Distributed coordination functionThroughputbackoff algorithmHandshakingMedia access controlMultiple Access with Collision Avoidance for WirelessIEEE 802.11e-2005businessCarrier sense multiple access with collision avoidanceComputer networkSixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks
researchProduct

Analysis of the IEEE 802.11e EDCA Under Statistical Traffic

2006

Many models have been proposed to analyze the performance of the IEEE 802.11 distributed coordination function (DCF) and the IEEE 802.11e enhanced distributed coordination function (EDCA) under saturation condition. To analyze DCF under statistical traffic, Foh and Zukerman introduce a model that uses Markovian Framework to compute the throughput and delay performance. In this paper, we analyze the protocol service time of EDCA mechanism and introduce a model to analyze EDCA under statistical traffic using Markovian Framework. Using this model, we analyze the throughput and delay performance of EDCA mechanism under statistical traffic.

IEEE 802Computer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMarkov processWireless local area networks (WLAN)ThroughputDistributed coordination functionThroughputComputer Science::OtherComputer Science::Performancebackoff algorithmsymbols.namesakeWireless lanComputer Science::Networking and Internet ArchitecturesymbolsbusinessThroughput (business)Protocol (object-oriented programming)Computer network
researchProduct

On-body and off-body transmit power control in IEEE 802.15.6 scheduled access networks

2014

Wireless Body Area Networks (WBANs) have received much attention due to the possibility to be used in healthcare applications. For these applications, energy saving is a critical issue, as in many cases, batteries cannot be easily replaced. A transmit power control scheme, able to adapt to the variations of the wireless body channel, will allow consistent energy saving and longer battery life. In this paper we propose a transmit power control scheme suitable for IEEE 802.15.6 narrowband scheduled access networks, in which the transmission power is modulated frame by frame according to a run-time estimation of the channel propagation conditions. A simple and effective line search algorithm i…

IEEE 802.15.6Access networkAdaptive Transmit Power ControlSettore ING-INF/03 - TelecomunicazioniInter-Access Point Protocolbusiness.industryComputer scienceTransmitter power outputKey distribution in wireless sensor networksNarrowbandComputer Science::Networking and Internet ArchitectureElectronic engineeringWirelessWBANRadio resource managementWireless Body Area NetworkbusinessWireless sensor networkFade marginIEEE 802.15ATPCComputer Science::Information TheoryPower controlComputer networkCommunication channel2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards

2006

It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …

Inter-Access Point ProtocolComputer sciencebusiness.industryReal-time computingWireless local area networks (WLAN)Network allocation vectorThroughputbackoff algorithmIEEE 802.11Network interface controllerMedia access controlIEEE 802.11e-2005IEEE 802.1XbusinessThroughput (business)Computer network
researchProduct

AI for Resource Allocation and Resource Allocation for AI: a two-fold paradigm at the network edge

2022

5G-and-beyond and Internet of Things (IoT) technologies are pushing a shift from the classic cloud-centric view of the network to a new edge-centric vision. In such a perspective, the computation, communication and storage resources are moved closer to the user, to the benefit of network responsiveness/latency, and of an improved context-awareness, that is, the ability to tailor the network services to the live user's experience. However, these improvements do not come for free: edge networks are highly constrained, and do not match the resource abundance of their cloud counterparts. In such a perspective, the proper management of the few available resources is of crucial importance to impr…

Internet Of ThingMINLPIoTEdge NetworkPerformance EvaluationLow Power Wide Area NetworkSystem ModelingSettore ING-INF/03 - TelecomunicazioniUAVSoftware Defined RadioReal TestbedVehicular NetworkMLLoRaReinforcement LearningResource AllocationMachine LearningGame TheoryArtificial IntelligenceAILPWANColosseum Channel EmulatorChannel EmulationEmulationSDR
researchProduct