Search results for "Local area network"
showing 10 items of 47 documents
A User-Balanced System for IP Telephony in WLANs
2008
Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…
A CAPWAP Architecture for Automatic Frequency Planning in WLAN
2007
Recently, the impressive success of the IEEE 802.11 WLAN technology has dramatically changed the role of the wireless connectivity provisioning. Born as a wireless extension of small office or home networks, todays the WLANs are getting more and more popular as a large, even metropolitan, area networks. The deployment of large-scale WLANs has some critical issues, because of the lack of coordinated management functionalities among the network nodes. In this paper we briefly describe the CAPWAP architectural solution, for centralizing some control and maintenance functionalities in large scale WLAN, by guaranteeing the interoperability between network nodes provided by different vendors. We …
On the accuracy of some common modeling assumptions for EDCA analysis
2005
Several models have been discussed in literature in order to evaluate the performance of the EDCA differentiation mechanisms. Despite of the exponential back off rules, usually the EDCA protocol has been modeled as a persistent slotted access protocol, and summarized into a set of access probabilities. These models often show a very different complexity and accuracy, according to the basis assumptions. In this paper, we propose a new modeling approach for EDCA, in which the medium access is described in terms of backoff counter comparisons, contention by contention, and no restrictive hypothesis is considered. Through our model, we verify the applicability of the most common protocol simpli…
Multiservice Optical Fibre Local Area Networks For Data Transmission And Telemetry In The Electric Power Industry
1986
The paper contains a review of a few of experimental optical fibre multiservice and multibranch local area networks /LANs/. Systems accomplish transmission, distribution and processing of analog or digital signals from numerous sources or measurement terminals. The authors put stress also on the possibility of combining transmission properties of fiber optic networks with fibre optic sensors. Several construction problems and chosen properties of multiport /multiterminal/ optical buses /networks/ have been considered. All examination systems of optical fibre LANs are discussed in respect of application them as telemetric, transmission, telesignaling and telecontrol systems for the power ele…
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
2007
A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …
An evaluation of switched ethernet and linux traffic control for real-time transmission
2008
Switched Ethernet networks are spreading to industrial environments more are more. The current trend is using them at all levels of a factory, replacing this way field-buses and other industrial networks. Switched Ethernet lacks the drawback of the non-deterministic collision resolution of coax cabling. However there are still some sources of indeterminism, mostly due to contention problems in message queues at switches and network interfaces. These problems can be dealt with using traffic control mechanisms for packet prioritisation and scheduling. These features have been largely inaccessible in Ethernet for a long time but, nowadays, they are widely available in industrial switches and a…
Enabling Cognitive-Radio Paradigm on Commercial Off-The-Shelf 802.11 Hardware
2013
Cognitive Radio paradigm (CR) has been recognized as key enabler for next generation wireless networking: the pos- sibility to access the limited radio spectrum in an oppor- tunistic manner allows secondary users to boost their trans- mission performance without interfering with existing pri- mary networks. Full testing and experimenting with this paradigm, however, is still a tough task, given either the i) limited capabilities above the PHY layer of cheap SDR so- lutions, or the ii) heavy investment required for setting up multi-node testbeds powered by FPGAs. In this demo we show how we leveraged our Wireless MAC Processor archi- tecture to tackle the two issues at the same time, providi…
Transience versus recurrence for scale-free spatial networks
2020
Weight-dependent random connection graphs are a class of local network models that combine scale-free degree distribution, small-world properties and clustering. In this paper we discuss recurrence or transience of these graphs, features that are relevant for the performance of search and information diffusion algorithms on the network.
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
2006
It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance differences are evident both when the cards contend alone to the channel, and when heterogeneous cards contend together. Since the performance misalignment does not disappear by averaging the environmental factors (such as propagation conditions, laptop models, traffic generators, etc), it is evident that the well known throughput-fairness property of the DCF protocol is not guaranteed in actual networks. In this paper we propose a methodological approach devised to experimentally characterize the IEEE 802.11 commercial …
Tunable antenna system for plug&play satellite avionics: Prototyping and test
2014
In the framework of an ESA program, a new architecture for plug&play compact antenna systems in the X band has been investigated and experimentally verified by many prototypes. The proposed antenna system takes inspiration from the LEGO building toys: the basic component of the new architecture is a 2.7cm-cube complex module that integrates a three-dimensional local network and a programmable mechanism based on the bonding-wire technology to select one among three polarization options. Elemental blocks can be augmented by accessories to shape the beam and may be used in array configuration over boards provided with cluster-level beamforming networks. Measurements have been performed for bot…