Добро пожаловать в клуб

Показать / Спрятать  Домой  Новости Статьи Файлы Форум Web ссылки F.A.Q. Логобург    Показать / Спрятать

Главное меню
ДомойНовостиСтатьиДефектологияПостановка звуковФайлыКнижный мирФорумСловарьРассылкаКаталог ссылокРейтинг пользователейЧаВо(FAQ)КонкурсWeb магазинШкольникамЭлектроникаБыт.техникаКарта сайта

Поздравляем нового Логобуржца Dorofeeva со вступлением в клуб!



Greedy Behavior in Wireless Network Hotspots   Ali Alsahag Alkazmi and Mohamed Othman

Greedy Behavior in Wireless Network Hotspots

128 страниц. 2011 год.
LAP Lambert Academic Publishing
Wireless LANs were originally meant to be deployed in protected locations such as corporate offices; But, over the last few years, IEEE 802.11 has also become the dominating solution for hotspots, which provide public wireless access to the Internet. Furthermore, the increased level of sophistication in the design of protocol components, together with the requirement for flexible and readily reconfigurable protocols has led to the extreme where wireless network adapters and devices have become easily programmable. As a result, it is feasible for a network peer to tamper with software and firmware, modify its wireless interface and network parameters and ultimately abuse the protocol, Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolution mechanisms for sharing the wireless channel where a greedy user can substantially increase his share of bandwidth, at the expense of the other users by slightly modifying the driver of his network...
- Генерация страницы: 0.04 секунд -