TITLE

Above and beyond quality of service

PUB. DATE
March 2004
SOURCE
Portable Design;Mar2004, Vol. 10 Issue 3, p17
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article focuses on the additional features of the 802.11 wireless technology standard. The Block ACK is the simplest of the three features discussed in this article. Each data transfer is separated by a short interframe space period, further improving throughput of the wireless local area network. The Direct Link Protocol increases the efficiency of high-bandwidth applications by allowing two nodes to communicate directly rather than having to go through the access point. The Automatic Power Save Delivery addresses power issues for mobile technology devices that need to maximize battery life.
ACCESSION #
12514526

 

Related Articles

  • The 802.11g reality drives 802.11a's future dominance.  // Portable Design;Mar2004, Vol. 10 Issue 3, p24 

    This article argues that the 802.11a-based wireless technology solutions will dominate developments pertaining to the use of the wireless local area network, due to the increased need to deliver greater network capacity and performance than that offered by the 802.11g standard. The increasing...

  • Dateline: Jellystone Park. Mehta, Stephanie N. // Fortune;6/24/2002, Vol. 145 Issue 13, p152 

    Discusses FHP, a company that offers access points that contain a wireless router, which forwards information from hot spot to hot spot until the data reach a device with a wired connection to the Internet. Possibility that schools and companies could soon establish 802.11 connection in places...

  • Understanding QoS issues for 802.11.  // Portable Design;Mar2004, Vol. 10 Issue 3, p18 

    This article discusses why the 802.11 wireless technology standard must adopt quality of service (QoS) principles. As traffic loads increase on a wireless local area network, high-priority and real time links lose reliability because nodes contend with each other to determine which one will get...

  • Beware the silence of a good idea. Clark, Robert // Wireless Asia;Nov2004, Vol. 7 Issue 9, p6 

    No abstract available.

  • CogNS: A Simulation Framework for Cognitive Radio Networks. Esmaeelzadeh, Vahid; Berangi, Reza; Sebt, Seyyed; Hosseini, Elahe; Parsinia, Moein // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2849 

    Cognitive radio technology has been used to efficiently utilize the spectrum in wireless networks. Although many research studies have been done recently in the area of cognitive radio networks (CRNs), little effort has been made to propose a simulation framework for CRNs. In this paper, a...

  • Strategies for deploying Wi-Fi. Abramowitz, Jeff // Communications News;Apr2004, Vol. 41 Issue 4, p40 

    This article discusses several strategies for deploying wireless fidelity (Wi-Fi) technology. The 802.11b wireless local area network (LAN) standard offers maximum range up to 11 Mbps, more than enough bandwidth for single-client users. The bandwidth of a wireless network is shared, however,...

  • Comprehend the various implementations of WLANs to get the highest throughput.  // Portable Design;Mar2004, Vol. 10 Issue 3, p14 

    This article focuses on the multiple-input multiple-output (MIMO) technology and the wideband adaptive orthogonal frequency-division multiplexing (OFDM) technology which can be used to enable the wireless local area network technology to get the highest throughput. The primary advantage of the...

  • Unsecured Wi-Fi access points a concern. Mohney, Doug // Mobile Radio Technology;Jan2005, Vol. 23 Issue 1, p30 

    This article focuses on Wi-Fi access to monitor airwaves for rogue wireless LAN users. According to security companies, federal regulations such as the HIPPA health care privacy act and Sarbanes-Oxley financial reporting requirements have pushed publicly owned the box security standards such as...

  • Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks. Yun, Ji-Hoon; Park, Min-Ho // Wireless Personal Communications;Nov2013, Vol. 72 Issue 4, p2519 

    There have been many security protocols to provide authenticity and confidentiality in wireless ad hoc networks. However, they fail to defend networks against relaying attack in which attacker nodes simply broadcast received packets without compromising any legitimate nodes. Wormhole attack is a...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics