Search results for "Physical layer"
showing 10 items of 25 documents
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
2019
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…
Out-of-Band Signaling Scheme for High Speed Wireless LANs
2007
In recent years, the physical layer data rate provided by 802.11 Wireless LANs has dramatically increased thanks to significant advances in the modulation and coding techniques employed. However, previous studies show that the 802.11 MAC operation, namely the distributed coordination function (DCF), represents a limiting factor: the throughput efficiency drops as the channel bit rate increases, and a throughput upper limit does indeed exist when the channel bit rate goes to infinite high. These findings indicate that the performance of the DCF protocol will not be efficiently improved by merely increasing the channel bit rate. This paper shows that the DCF performance may significantly bene…
A Kalman Filter Approach for Distinguishing Channel and Collision Errors in IEEE 802.11 Networks
2008
In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel waste due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the network congestion level. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feasibility…
Performance analysis of selfish access strategies on WiFi infrastructure networks
2009
In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…
Kalman filter estimation of the contention dynamics in error-prone IEEE 802.11 networks
2008
In the last years, several strategies for maximizing the throughput performance of IEEE 802.11 networks have been proposed in literature. Specifically, it has been shown that optimizations are possible both at the medium access control (MAC) layer, and at the physical (PHY) layer. In fact, at the MAC layer, it is possible to minimize the channel wastes due to collisions and backoff expiration times, by tuning the minimum contention window as a function of the number n of competing stations. At the PHY layer, it is possible to improve the transmission robustness, by selecting a suitable modulation/coding scheme as a function of the channel quality perceived by the stations. However, the feas…
Efficiency analysis of burst transmissions with block ACK in contention-based 802.11e WLANs
2005
The channel utilization efficiency of the standard 802.11 networks is severely compromised when high data transmission rates are employed, since physical layer headers and control frames are transmitted at low rate, thus wasting more channel time, proportionally. The extensions defined in the emerging 802.11e for quality-of-service (QoS) provisioning include some new mechanisms developed in order to improve the efficiency. Those include data transmission bursting (referred to as TXOP operation) and acknowledgment aggregation (referred to as block ACK). These two features allow it to offer new data transmission services, in which the data delivery and acknowledgment unit is not a single fram…
Revealing transmit diversity mechanisms and their side-effects in commercial IEEE 802.11 cards
2008
Service differentiation in WLAN has been traditionally faced at the MAC layer. However, some PHY layer parameters, such as the transmission power, the antenna, and the modulation/coding scheme, have a deep impact on network performance. Since the criterion for selecting these parameters is left to the vendor specific implementations, the performance spread of most experimental results about 802.11 WLAN could be affected by vendor proprietary schemes. The focus of this paper is an experimental analysis of the undisclosed antenna diversity mechanisms employed by some widely used cards (namely, the Atheros and Intel based cards), and a thorough understanding of the optimization goals which gui…
Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study
2016
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…
Chip-to-chip plasmonic interconnects and the activities of EU project NAVOLCHI
2012
In this paper, the chip-to-chip interconnection architecture adopted by the EU-project NAVOLCHI are discussed. The plasmonic physical layer consisting of a plasmonic nanoscale laser, a modulator, an amplifier and a detector is introduced. Current statuses of the plasmonic devices are reviewed.
How the Atmospheric Variables Affect to the WLAN Datalink Layer Parameters
2010
There are many issues that affect to WLAN connections (walls, vegetation, rain, objects in the Fresnel zone, etc.). Network designers and telecommunication practitioners must take them into account when they are planning wireless connections between devices. Some studies have demonstrated the implication of the atmospheric variables in the frequency attenuation and in the line of sight of the waves. But, to the extend of our knowledge, there is not any work published that relates the atmospheric variables with the datalink layer parameters of the WLANs. We must take into account that the datalink layer allows us to measure quite more parameters than the physical layer. After a review of the…