scroll to top

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "IEEE 802.11 (Standard)"

1 - 10 of 13,976 results for
 "IEEE 802.11 (Standard)"
Results per page:

An Optimization of Network Performance in IEEE 802.11ax Dense Networks.

Publication Type: Academic Journal

Source(s): International Journal of Electronics & Telecommunications. 2023, Vol. 69 Issue 1, p169-176. 8p.

Abstract: The paper focuses on the optimization of IEEE 802.11ax dense networks. The results were obtained with the use of the NS-3 simulator. Various network topologies were analyzed and compared. The advantage of using MSDU and MPDU aggregations in a dense net...

Realistic Vertical Handoff Predictive Trigger Thresholding in Heterogeneous Networks.

Publication Type: Academic Journal

Source(s): Ingénierie des Systèmes d'Information. Aug2022, Vol. 27 Issue 4, p557-563. 7p.

Abstract: The contemporary wireless networks exhibit heterogeneity, i.e., different types of wireless networks co-exist and fulfill the user's needs. Users amongst the available networks prefer the Wi-Fi and 4G networks. Wi-Fi is a choice for homes and offices f...

Monitoring the movement of housed animals by means of wireless technology.

Publication Type: Academic Journal

Source(s): Research in Agricultural Engineering. 2022, Vol. 68 Issue 3, p142-149. 8p.

Abstract: Currently, several, more or less, suitable means for detecting, identifying and monitoring the position of housed animals exist. However, these means suffer from various limitations, which could be eliminated with regard to the current technical and te...

On the Benefits of Channel Bonding in Dense, Decentralized Wi-Fi 4 Networks.

Publication Type: Academic Journal

Source(s): Wireless Communications & Mobile Computing. 3/9/2022, p1-11. 11p.

Abstract: Channel bonding is a technique first defined in the IEEE 802.11n standard to increase the throughput in wireless networks by means of using wider channels. In IEEE 802.11n (nowadays also known as Wi-Fi 4), it is possible to use 40 MHz channels instead ...

A Multicriteria Decision-Making Framework for Access Point Selection in Hybrid LiFi/WiFi Networks Using Integrated AHP–VIKOR Technique.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Feb2023, Vol. 23 Issue 3, p1312. 45p.

Abstract: Since light fidelity (LiFi) and wireless fidelity (WiFi) do not interfere with one another, a LiFi/WiFi hybrid network may provide superior performance to existing wireless options. With many users and constant changes, a network can easily become over...

Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs.

Publication Type: Academic Journal

Source(s): Computer Communications. Sep2022, Vol. 193, p279-292. 14p.

Abstract: The next generation of WLANs will be, for the most part, ubiquitous in urban areas, densely deployed, and implementing the latest amendment of IEEE 802.11 standard, namely 802.11ax also known as Wi-Fi 6. Among the main purposes of 802.11ax is the impro...

BER and throughput performances of IEEE 802.11ay SC-PHY over measured 60 GHz indoor channels.

Publication Type: Academic Journal

Source(s): Telecommunication Systems. Aug2022, Vol. 80 Issue 4, p573-587. 15p.

Abstract: The IEEE 802.11ay is an emerging system that will become a full member of the big family of the IEEE 802.11 standards in the near future. Compared to its predecessor IEEE 802.11ad, it promises to offer higher system flexibility and more reliable wirele...

Preventing Attacks on Wireless Networks Using SDN Controlled OODA Loops and Cyber Kill Chains.

Publication Type: Academic Journal

Source(s): Sensors (14248220). Dec2022, Vol. 22 Issue 23, p9481. 17p.

Abstract: Impersonation-based attacks on wireless networks are easy to perform and can significantly impact network security. Their detection is problematic due to the attacks utilizing legitimate functions. This paper proposes a novel algorithm based on Observe...

Research on WiFi Penetration Testing with Kali Linux.

Publication Type: Academic Journal

Source(s): Complexity. 6/22/2021, p1-8. 8p.


Abstract: Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods...