This paper presents a performance study of the distributed coordination function (DCF) of 802.11 networks considering erroneous channel and capture effects under non-saturated traffic conditions employing a basic ac...This paper presents a performance study of the distributed coordination function (DCF) of 802.11 networks considering erroneous channel and capture effects under non-saturated traffic conditions employing a basic access method.The aggregate throughput of a practical wireless local area network (WLAN) strongly depends on the channel conditions.In a real radio environment,the received signal power at the access point from a station is subjected to deterministic path loss,shadowing,and fast multipath fading.The binary exponential backoff (BEB) mechanism of IEEE 802.11 DCF severely suffers from more channel idle time under high bit error rate (BER).To alleviate the low performance of IEEE 802.11 DCF,a new mechanism is introduced,which greatly outperforms the existing methods under a high BER.A multidimensional Markov chain model is used to characterize the behavior of DCF in order to account both non-ideal channel conditions and capture effects.展开更多
To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bit...To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bits per second (Gbps). In this paper, we discuss signature detection technique (SDT) used in network intrusion detection system (NIDS). Design of most commonly used hardware based techniques for signature detection such as finite automata, discrete comparators, Knuth-Morris-Pratt (KMP) algorithm, content addressable memory (CAM) and Bloom filter are discussed. Two novel architectures, XOR based pre computation CAM (XPCAM) and multi stage look up technique (MSLT) Bloom filter architectures are proposed and implemented in third party field programmable gate array (FPGA), and area and power consumptions are compared. 10Gbps network traffic generator (TNTG) is used to test the functionality and ensure the reliability of the proposed architectures. Our approach involves a unique combination of algorithmic and architectural techniques that outperform some of the current techniques in terms of performance, speed and powerefficiency.展开更多
This paper presents a mathematical model that analyzes the throughput of the IEEE 802.11b distributed coordination function (DCF) with the collision aware rate adaptation (CARA) algorithm. IEEE 802.11 WLANs provid...This paper presents a mathematical model that analyzes the throughput of the IEEE 802.11b distributed coordination function (DCF) with the collision aware rate adaptation (CARA) algorithm. IEEE 802.11 WLANs provide multiple transmission rates to improve system throughput by adapting the transmission rate to the current channel conditions. The system throughput is determined by some stations using low transmission rates due to bad channel conditions. CARA algorithm does not disturb the existing IEEE 802.11b formats and it can be easily incorporated into the commercial wireless local area networks (WLAN) devices. Finally, we verify our findings with simulation.展开更多
文摘This paper presents a performance study of the distributed coordination function (DCF) of 802.11 networks considering erroneous channel and capture effects under non-saturated traffic conditions employing a basic access method.The aggregate throughput of a practical wireless local area network (WLAN) strongly depends on the channel conditions.In a real radio environment,the received signal power at the access point from a station is subjected to deterministic path loss,shadowing,and fast multipath fading.The binary exponential backoff (BEB) mechanism of IEEE 802.11 DCF severely suffers from more channel idle time under high bit error rate (BER).To alleviate the low performance of IEEE 802.11 DCF,a new mechanism is introduced,which greatly outperforms the existing methods under a high BER.A multidimensional Markov chain model is used to characterize the behavior of DCF in order to account both non-ideal channel conditions and capture effects.
文摘To meet the future internet traffic challenges, enhancement of hardware architectures related to network security has vital role where software security algorithms are incompatible with high speed in terms of Giga bits per second (Gbps). In this paper, we discuss signature detection technique (SDT) used in network intrusion detection system (NIDS). Design of most commonly used hardware based techniques for signature detection such as finite automata, discrete comparators, Knuth-Morris-Pratt (KMP) algorithm, content addressable memory (CAM) and Bloom filter are discussed. Two novel architectures, XOR based pre computation CAM (XPCAM) and multi stage look up technique (MSLT) Bloom filter architectures are proposed and implemented in third party field programmable gate array (FPGA), and area and power consumptions are compared. 10Gbps network traffic generator (TNTG) is used to test the functionality and ensure the reliability of the proposed architectures. Our approach involves a unique combination of algorithmic and architectural techniques that outperform some of the current techniques in terms of performance, speed and powerefficiency.
文摘This paper presents a mathematical model that analyzes the throughput of the IEEE 802.11b distributed coordination function (DCF) with the collision aware rate adaptation (CARA) algorithm. IEEE 802.11 WLANs provide multiple transmission rates to improve system throughput by adapting the transmission rate to the current channel conditions. The system throughput is determined by some stations using low transmission rates due to bad channel conditions. CARA algorithm does not disturb the existing IEEE 802.11b formats and it can be easily incorporated into the commercial wireless local area networks (WLAN) devices. Finally, we verify our findings with simulation.