Results 1 - 10
of
3,798
Deployment Issues in Enterprise Wireless LANs
"... Although Wireless LANs market has grown tremendously in last few years, their enterprise deployments have been fairly limited. From manual site survey process to ensure signal coverage at all locations, to the well known security issues in original standards, there have been several deterrents to a ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Although Wireless LANs market has grown tremendously in last few years, their enterprise deployments have been fairly limited. From manual site survey process to ensure signal coverage at all locations, to the well known security issues in original standards, there have been several deterrents to a
DOMINO: Relative Scheduling in Enterprise Wireless LANs
"... †Co-primary authors Large-scale Enterprise WLANs are amenable to centralized control and coordination through the wired backbone for im-proved performance. Distributed scheduling algorithms ei-ther fail to achieve high performance in real deployments due to their myopic view of interference characte ..."
Abstract
- Add to MetaCart
†Co-primary authors Large-scale Enterprise WLANs are amenable to centralized control and coordination through the wired backbone for im-proved performance. Distributed scheduling algorithms ei-ther fail to achieve high performance in real deployments due to their myopic view of interference
A Location-Based Management System for Enterprise Wireless LANs. Microsoft Research
, 2007
"... Abstract: The physical locations of clients and access points in a wireless LAN may have a large impact on network perfor-mance. However, today’s WLAN management tools do not pro-vide information about the location of clients apart from which access point they associate with. In this paper, we descr ..."
Abstract
-
Cited by 28 (6 self)
- Add to MetaCart
Abstract: The physical locations of clients and access points in a wireless LAN may have a large impact on network perfor-mance. However, today’s WLAN management tools do not pro-vide information about the location of clients apart from which access point they associate with. In this paper, we
FLUID: Improving Throughputs in Enterprise Wireless LANs through Flexible Channelization
, 2011
"... This paper introduces models and a system for designing 802.11 wireless LANs (WLANs) using flexible channelization — the choice of an appropriate channel width and center frequency for each transmission. In contrast to current 802.11 systems that use fixed width channels, the proposed system, FLUID, ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
This paper introduces models and a system for designing 802.11 wireless LANs (WLANs) using flexible channelization — the choice of an appropriate channel width and center frequency for each transmission. In contrast to current 802.11 systems that use fixed width channels, the proposed system, FLUID
A location-based management system for enterprise wireless LANs
- IN PROCEEDINGS OF THE 3RD ACM/USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI
, 2007
"... The physical locations of clients and access points in a wireless LAN may have a large impact on network performance. However, today’s WLAN management tools do not provide information about the location of clients apart from which access point they associate with. In this paper, we describe a scal ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
The physical locations of clients and access points in a wireless LAN may have a large impact on network performance. However, today’s WLAN management tools do not provide information about the location of clients apart from which access point they associate with. In this paper, we describe a
Protecting Enterprise Wireless LANs Using an Integrated Security Approach of VPN over
- 802.11i”, 3rd International Conference on Cyber Information Technology and System Applications (CITSA
, 2006
"... The popularity of 802.11-based WLAN also increases its risk of security attacks. Common examples of these attacks are eavesdropping, tampering, masquerading, and forgery. Current security measures used to protect WLANs include WEP, WEP-802.1X, VPN/WEP-802.1X and 802.11i. We present the weaknesses of ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
of each approach and conclude that they cannot resolve all security threats on WLANs. Recently, several wireless vendors propose an integrated approach of applying VPN over 802.11i to protect WLANs. However, there is no published research work on this approach. In this paper, we analyze this integrated
Coverage and Capacity Issues in Enterprise Wireless LAN Deployment Abstract — Although Wireless LANs
"... market has grown tremendously in the last few years, their enterprise deployment has been fairly limited. From manual site survey process to ensure adequate coverage to well-known security issues in original standards, there have been several deterrents to widespread enterprise deployment of wireles ..."
Abstract
- Add to MetaCart
an enterprise. We bring out the similarities between these issues and related deployment issues in cellular networking arena, and discuss various proposed solutions in both contexts. Finally, we survey several advanced architectures that further automate the deployment and management of wireless LANs. I.
MACAW: A Media Access Protocol for Wireless LAN's
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract
-
Cited by 839 (11 self)
- Add to MetaCart
In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols
A comparison of mechanisms for improving TCP performance over wireless links
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 1997
"... Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses due to bit errors and handoffs. TCP responds to all losses by i ..."
Abstract
-
Cited by 927 (11 self)
- Add to MetaCart
Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. However, networks with wireless and other lossy links also suffer from significant losses due to bit errors and handoffs. TCP responds to all losses
On limits of wireless communications in a fading environment when using multiple antennas
- Wireless Personal Communications
, 1998
"... Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (M ..."
Abstract
-
Cited by 2426 (14 self)
- Add to MetaCart
(MEA) technology, that is processing the spatial dimension (not just the time dimension) to improve wireless capacities in certain applications. Specifically, we present some basic information theory results that promise great advantages of using MEAs in wireless LANs and building to building wireless
Results 1 - 10
of
3,798