IEEE 802.11 Standards for Different Wireless Networks
Question:
Discuss About The Detailed Comparison Of Future IEEE 802.11?
There has been a convergence of the networks of communication and technologies and it is used for the development of the data communications for application in different fields of the telecommunication environment. The technology is not dependent on the application in different telecommunication networks, there are different communication standards that should be followed for establishment of connection between the nodes installed in a telecommunication framework. The telecommunication standards are followed internationally and the specification of the standards are set by the IETF Internet Task Engineering Force (Xie et al. 2015). The communication devices has increased and the use of mobile handheld devices has also increased in the recent times. Thus with the increase in the mobile users new connection technology is required to be deployed. IEEE 802.11 standard finds its application in the WLAN, Wifi, WiMAX, 3G, 4G, etc. It is used for supporting the growth of the wireless networks and state the communication methodology (Fay et al. 2016). The wireless psychology is growing and a comparison is made on the different IEEE standards for finding its application in different wireless networks. The comparison is made based on the area of coverage, bandwidth, interference and quality of the signals.
The main focus of the study is made on the WLA technology and different literatures are reviewed for analyzing the access points and modes used for communication. A centralized communication mode is followed for establishment of the wireless connection between the nodes installed in the network. A study is also made on the decentralized communication modes and communicate directly with the access points installed in different location of the network. IEEE 802.11 standards are reviewed in the context of extension point and the features available on the IEEE 802.11 standards. There are some upcoming standards for the development of the IEEE 802.11 i.e. HiperLAN. The different layers of the network such as the physical layer, access layer and the network layer are used for the transmission of the data packets in the network. Radio medium are used for the transmission and for the development of the IEEE 802.11 the targeted and the available standards are analyzed. The extension of the 802.11 are evaluated and the data rate that should be maintained in the network are analyzed. The base standards of the 802.11 provides a data rate of 2Mbps and it can reach to 11 Mbps with the implementation of the 802.11b standards.
The IEEE is used for the development of nonprofit transitional methodology that are supported by different technical activities that includes active program of standardization using the IEEE standard association. The IEEE is a nonprofit translational technical professional organization and it supports different technical activities such as an active standardization program (Trappe 2015). It can be openly developed and it have been proved that the participation of the voluntary participants can help in producing high quality accepted result that can be used for the development of the IEEE 802.11 standards. IEE 802.11 have a parameter that is the fragmentation threshold which defines the method of transmission also known as the fragmentation burst. The Mac protocol data unit which is larger than the threshold is divided into smaller elements and each of the elements are transmitted in the wireless network at a regular interval of time. This procedure saves the cost and time wireless network by retransmitting the smaller elements where error is found instead of resending the whole MSDU unit (Lyamin et al. 2014). There is a requirement of implementation of the QoS in the wireless LAN and the following four parameters should be considered for maintaining the quality of the network such as:
- Bandwidth /Throughput
- Latency / Delay
- Jitter, and
- Error or data loss
Literature Review: WLA Technology and Access Points
The environment of the WLAN is dependent on inference and it can cause high errors and it should be eliminated for getting the best performance of the wireless network. The confidentiality of the network should be maintained and data should not be access by any third party and it should reach to the user as the same fort when it was sent by the sender over the network.
The 802 standards works on the Open Systems Interconnection OSI layer. The radio waves was first used for the transferring of data packets over short distance and it is different from the wired medium used for transmission of the data packets. Attenuation occurs in the signals of the radio waves and thus it is difficult to find the collision between the data packets (Zheng and Li 2015). The 802.11 standards was developed following the home and the office networks and it was introduced in the year 1999. The primary standard of 802.11 can provide a data rate of 2 mbps for each of the access points installed in the network the data rate can be increased to 11 mbps with the implementation of the 802.11b standard in the network. There are new IEEE extensions such as IEEE 802.11g and IEEE 802.11a that can be applied for connecting the wireless local area network. The WLAN devices selected for the transmission of the data should fulfill the security mechanism and it should also have the QoS support for handling the security threats that can affect the network (Ma et al. 2015). There are certain limitations of the IEEE 802.11 and it should be improved for meeting the security framework and different features must be enabled for allowing seamless transmission between the nodes installed in the network. Different bands are used for transmission such as the 2.4 GHZ and 5 GHz bands for reducing the inference and improve the quality of the network.
The physical layer of the network consists of the Infrared (IR) spectrum, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Different physical PHY layer are utilized by the IEEE 802.11 standards based on the multiplexing and increasing the throughput of the network (Yang et al. 2015). The modulation techniques followed for IEEE 802.11 are tabulated below:
Data rate |
Coding rate |
Modulation |
Code bits/ OFDM symbol |
Code bits/ sub carrier |
Data bits/ OFDM symbols |
6 |
1/2 |
BPSK |
48 |
1 |
24 |
9 |
3/4 |
BPSK |
48 |
1 |
36 |
12 |
1/2 |
QPSK |
96 |
2 |
48 |
18 |
3/4 |
QPSK |
96 |
2 |
72 |
24 |
1/2 |
16-QAM |
192 |
4 |
96 |
36 |
3/4 |
16-QAM |
192 |
4 |
144 |
48 |
2/3 |
64-QAM |
288 |
6 |
192 |
54 |
3/4 |
64-QAM |
288 |
6 |
216 |
The IEEE 802.11b utilizes a new PHY layer and high rate DSSS which is based on the orthogonal Frequency Division Multiplexing and is used for increasing the overall throughput of the access point installed in different location of the network. Most of the extension of IEEE Conclusion works on the 2.4 Ghz frequency band and it has 14 different channels. The availability of the channels depends on different countries (Rajandekar and Sikdar 2015). In the year 1997 the 802.11 standard was developed for the WLANs and it supports the radio transmission in the 2.4 Ghz frequency bands. In the year 1999, IEEE made two amendments in the 802.11 standards i.e. the 802.11 a standard and the 802.11 b standard, which is used for defining the transmission methodology and the WLAN equipment’s for the enterprise and the personal usage.
Analysis of IEEE 802.11 Standards and Extensions
The 802.11b is the most successful wireless technology and it can offer data rate of about 11 mbps. It is designed to get the maximum performance from the network with more security and throughput when compared with the wired network. The IEEE 802.11g was launched in the year 2003 that offers the network utilizing the 2.4 Ghz frequency band to support a data rate of 54 mbps and most importantly it was designed such that it was compatible with the previous 802.11 standards (Qiao et al. 2015). The following table is created to demonstrate the maximum data rate that can be achieved with the different IEEE 802.11 standards in the network, their typical range and the frequency bands.
IEEE Standards |
Typical Range |
Maximum Data Rate |
Frequency bands |
Comment |
802.11 |
50 to 100 m |
2.4 GHz |
2 Mbps |
|
802.11a |
50 to 100 m |
5 GHz |
54 Mbps |
It is not compatible with the later 802.11b standard |
802.11b |
50 to 100 m |
2.4 GHz |
11 Mbps |
It is the best 802.11 standard for normal wireless network |
802.11g |
50 to 100 m |
2.4 GHz |
54 Mbps |
It is compatible with the IEEE 802.11b standards. |
It is a part of the IEEE 802.11 standard and was first introduced in the year 1997 for protecting the link level data while transmitting the data wirelessly. It was the first protocol based on cryptography for protecting the wireless access point from unauthorized access and keep the network secure. The WEP utilizes the shared key authentication mechanism for encrypting the wireless signals and securing the wireless communications. It have the support of 40 bit key and with the application of extension it can support for 128bit and even 256 bit encryption (Farooq and Kunz 2015). It protects the network from Eavesdropping with the application of the linear hash function for integration of the data. There are no key management present in WEP and there are also some weakness that requires the WEP replaced by the WPA encryption technique
There are two security protocol WPA and WPA2 developed by the Wi Fi alliance, one was designed for mitigation of the problem faced in the WEP while the later WPA 2 was designed for the enterprise and the personal usage. For the personal mode of 802.11 a pre shared key is used for authentication and for the enterprise mode the IEEE 802.1X is applied for getting an optimum result. There are different encryption algorithm applied for securing the wireless network, among them the WPA and the WPA2 was developed for overcoming the shortcomings of the WEP ad reducing the complexity of the network (Ma et al. 2015). The WPA 2 can be easily deployed and meets the 802.11i specification for addressing the weakness of WEP. The TKIP algorithm is used by the WPA and it works by providing each of the client with a unique key and an encrypted message is used for checking the integrity and with the fields in the packets. It is specially designed such that the attackers cannot capture the data packets sent over the wireless network and preventing the spoofing and denial of service attacks (Shokri-Ghadikolaei et al. 2015). There are four different key factors for the WPA2 authentication such as:
- Mutual authentication
- Ease to Use
- Interoperability, and
- Strong Encryption
WPA2 have several advantages because it can be used for the management of the keys and detection of the replays. The main aspect of the wireless network are the security and the confidentiality of the users must be maintained while sending and receiving the information over the network (Trivedi 2016). There are different types of attacks that can compromise the security of the network such as spoofing, man in the middle attack, session hijacking, etc. With the application of the IEEE a secure wireless network can be created and the data transmission speed similar to the wired network can be achieved (Ye 2017). It can be used for effectiveness of the mechanism and analysis of the performance of the network.
QoS Implementation in Wireless LAN
With the implementation of the IEEE the wireless network can be secured because there are several features in the IEEE such as filtering of the Media control access address and disabling of the SSID. The vulnerability of the network can be reduced with the evolution of the computer hardware and software technology but some of the wireless network still needs to address the security problems for making it more secure. The Wi Max have some drawbacks such as mutual authentication which makes it susceptible to spoofing and relay attacks.
In order to enhance the average throughput of the network, various Physical Layers are used in the 802.11 standard. The physical layers that are used in the network are such as Frequency Hopping Spread Spectrum or FHSS, Direct Sequence Spread Spectrum or DSSS and infrared or IR. The 802.11b utilizes an additional physical layer along with the mentioned layers named as High Rate DSSS. On the basis of the (Orthogonal Frequency Division Multiplexing, the 802.11g and 802.11a are invented (Palattella et al. 2016). This mechanism is very assisting in increasing the entire throughput of the access point. The OFDM mechanism is used along with the MIMO or Multi Input Multi Output methodology. Most of the extension of the 802.11 operates in the 2.4 GHz spectrum band with fourteen distinct channels. The capability of these channels are different in different countries. The last feature that was included in the 802.11j was the last channel of the fourteen channels mentioned above. This channel was developed especially for Japan (Khorov et al. 2015).
The extension of IEEE 802.11a functions with channels ranging from thirty-five to one hundred and sixty one on the basis of frequency band. This standard works with only the 5 GHz frequency. In U.S.A. and Europe there are twelve and nineteen non-overlapping channels respectively. However, in terms of 802.11b there are only three out of fourteen non-overlapping channels (Abdelrahman, Mustafa and Osman 2015). The bandwidth is high in case of 802.11n as it work in the overlapping channels with 20 and 40 MHz bandwidth. The directional antennas may be utilized for establishing the peer to peer WLAN links. The omnidirectional antennas that are used in the distinctive WLAN access are ranged thirty-fifty and hundred meter in case of indoor and outdoor respectively. The range can be highly affected by the obstacles placed within the access point and station (Palattella et al. 2016). In comparison to 802.11b and 802.11g, the 802.11a is affected by the increase in the range. This is because the 802.11a operates in the 5MHz frequency range. The sectored antennas are capable of increasing the average data rate of WLAN by two to three times.
The scheme named as the Distributed Coordinated Function or DCF is used by the IEEE 802.11 which is based on contention. Within this method, the station in connection with the access point is responsible for scanning the interface of air regarding identifying the availability of channel. If the interface is found to be idle then the station transmits its information to the designated destination via access point. The collision occurs while more than a single station is trying to access the access point or the air interface is busy (Freudiger 2015). The IEEE 802.11 CSMA/CA or Carrier Sense Multiple Access/Collision Avoidance for avoiding the collisions. Another MAC method is utilized by IEEE 802.11 named as Point Coordination Function. This methodology is consisted with two sections. Round Robin mechanism is used by the access points to scan the stations. This scanning is done to identify if any station has any packet to send. If the polling of the stations is not done in the stations during the present period then in the next polling period the station will be queued for polling (Liu et al. 2016). The scheme based on contention is used for scanning process and it is similar to DCF. Furthermore, because of the polling mechanism within the PCF, the reduction in the throughput of the 802.11 network occurs. In 802.11 standard, the DCF is used as the default MAC mechanism. While PCF is associated with the Wi-Fi alliance standard at the time of using both the MAC mechanisms in the standard, the DCF has become less popular.
Limitations and Improvements of IEEE 802.11
The main target of the IEEE 802.11 are MAC or medium access control and PHY or Physical Layer. At the beginning of the forming the wireless network available physical layer standard was considered. The first standard which was taken for Wireless Network was the most prominent standard of IEEE, 802.3 (Kasparick et al. 2015). Because of the using a standard that is similar to wired connection standard, the radio waves were not working properly. There was another problem as the no collision detection could be applied to 802.3 carrier sense multiple access. This happened because the over a short distance the attenuation could be detected.
After that 802.4 was considered to develop the wireless network. The Token Bus concept was formed by the new wireless standard and it was believed that this token bus concept was superior to the connection based scheme of 802.3 (Bray 2017). The Wireless Local Area Network was began as the 802.4L. In 1990, it was revealed that the managing the radio network through token handling was very difficult. On 21st March of 1991, the 802.11 standard was approved.
The Medium Access Layer manages the security. Various encryption methodologies has been implemented in the 802.11 standard for preventing the unauthorized access from the stations. The WEP or Wired Equivalent Piracy is one of the foremost encryption mechanisms. The WPA or Wi-Fi protection Access was developed by the Wi-Fi alliance in order to reduce the security vulnerabilities was present in the WPA encryption mechanism (Festag 2015). An advance version of Wi-Fi protection has been used in the IEEE 802.11i standard. The authentication issues associated with shared key and open standard authentication has been addressed in the 802.11i standard. The authentication mechanism that is being currently used in the 802.11 family was introduced in the 802.11X (Nitsche et al. 2014). A diameter or RADIUS server is used for authenticating the identities of the users. The 802.11 standard is being currently used has defined a term “frame” for managing and controlling the wireless links. The Protected Management Frames were developed by the TGw by inventing the 802.11w standard (Centenaro et al. 2016). The organization is still working on the MAC layer of the IEEE 802.11. It has been discovered that the security of the Wireless Network can be enhanced by improving the data confidentiality of the management frames. These extensions is capable of interacting with the IEEE 802.11r as well as IEEE 802.11u.
IEEE 802.11c: This standard is responsible for covering the bridge operation. In general, the bridge is referred to as a device that is linking to LANs with an identical or alike MAC protocol. The functions similar to IP or internet protocol level router functions are performed by the bridge. However, this functions are carried out in the MAC layer of the network (Bellalta et al. 2016). The bridge is considered to be easy to manage and configure in comparison to internet protocol routers.
IEEE 802.11d: The 802.11d was created in the 2001. The additional regulatory domain is supported by this amendment to the 802.11 standard specification. In this standard the differences in the regulatory in different countries are covered (Lyamin et al. 2014). Through this standard the operation parameters has been defined for the frequency band of 5 MHz, but it was being done only for Japan, North America and Europe. The support provided by this standard is also consisted with country data element to beacons, probe needs as well as to probe reactions (Kolias et al. 2016). Various regulations are enforced at the various countries of the world. In order to simplify the impact of the regulations on the access points and user devices. The country information is also assisting in conforming to operate at the frequency of 5MHz.
Physical Layer and Modulation Techniques
IEEE 802.11e: The 802.11e standard was first used in the year 2005. This standard is a crucial addition to the 802.11 standard which offers a collection of QoS advancements for the wireless Local Area Network applications via updating to the MAC or Medium Access Control layer. As it has been mentioned before, this standard has an impact on the communication of polled and time-scheduled communication at the time of null periods (Al-Sultan et al. 2014). During null periods, no data moves through the system. The robustness of the channel and the efficiency of the polling is enhanced by the IEEE 802.11e standard. The enhanced robustness and efficiency is proved to be crucial for the services like video streaming and IP telephony.
IEEE 802.11f: This is also considered as the optional extension to the IEEE 802.11 standard. The inter access point protocol or 802.11f is used in the environment where support is needed to be provided among the multivendor system. Through this standard, the access points is also capable of functioning as a bridge (Vladyko et al. 2016). This provides the medium of communication among the Wireless LAN stations within a specific region. The bridge that is connecting two LANs on a different types of the network is possible through this standard. The different networks are WMAN, LAN and Ethernet.
IEEE 802.11h: Along with the 802.11a signals 5GHz frequency is also used by the European Union Military with the purpose of radar and satellite communication. In order to handle the communication properly two methodologies has been introduced. These standards are DFS or Dynamic Frequency Selection and TCP or Transmit Power Control (Tian and Xu 2017). As per the DFS scheme, the networks that are functioning in the same frequency band is detected by the access point in order to prevent collision. Furthermore, the TPC can be utilized to update the condition of the link through switching the frequency in which access point is working to a further suitable channel. The only condition is that the later channel has to be clearer and must be able to reduce the consumption of the power.
IEEE 802.11i: Those point of the IEEE 802. 11i standard might have been will deliver security issues. The security Furthermore Confirmation instruments at those Macintosh layer were characterized in this standard. It tended to the security deficiencies in the wired proportional security (WEP) calculation initially intended for the Macintosh layer about 802. 11 (Ghandour et al. 2014). Wired equal security (WEP) might have been indicated to bring security vulnerabilities. Wi-Fi ensured get (WPA) might have been acquainted Toward the Wi-Fi collusion as a middle of the road answer for those WEP insecurities. The Wi-Fi union alludes on their interoperable usage of the full 802. 11i Likewise WPA2, Additionally called RSN (Robust security Network). Those 802. 11i standard makes utilization of the propelled encryption standard (AES) piece cipher as opposed on WEP Also WPA which utilize the RC4 stream cipher.
IEEE 802.11j: In 2004, this standard was introduced to the world of networking. This standard was specially developed for the Japanese market. This is capable of providing the WLAN operations form the frequency range of 4.9 to 5 GHz (Raeesi et al. 2014). This capability of working within these specific frequency has been done to cope with the Japanese protocols for outdoor, mobile and indoor communication.
IEEE 802.11k: In the IEEE 802.11k standard, the various enhancements has been defined for providing methodologies that are available to protocols layers over the PHY layers. This standard was developed with the purpose of enhancing the radio resource management (Rethfeldt et al. 2015). The management of the air interface among various access points has been enabled in this protocol.
IEEE 802.11l: The standard is not used and it is reserved. This standard is avoided in the particle world to prevent confusion with a well-known standard called 802.11i.
IEEE 802.11m: A continuous undertaking bunch might have been set in control for the support of the standard. The revisions and in addition clarifications Also adjustments need aid transformed occasionally. IEEE 802. 11m will be a continuous activity that gives a bound together perspective of the 802. 11 base measures through constant monitoring, administration and support. IEEE 802. 11m is dependent upon two archived activities (Giust, Cominardi and Bernardos 2015). They would IEEE 802. 11ma Furthermore IEEE 802. 11mb.
IEEE 802.11n: At last designed in 2009, the purpose of the IEEE 802.11n is for accessing the throughput of MAC or Medium Access Control band from the predecessor standards. First considered in 2002, the IEEE 802.11n standard development has been accepted as the source of assorted improvements to the center and Medium Access Control layers for advancement ion the throughput of the band. These advancements includes such entities as alters for schemes of proper encoding, antennas hat are miscellaneous, antennas that are acute, and alterations to protocols of MAC. IEEE 802.11n includes new mechanisms of MAC layer for accessing the throughput (Liang et al. 2015). The admitted utilizations of MIMO and mixed fresh emphasis and coding methodologies for accessing the summary amounts. The standard utilizes a fastened technique bandwidth that is 20MHz. This is beneficial for prior attraction with prior standards. IEEE 802.11n is also capable of working on a substitute channel with frequency of 40MHz.
IEEE 802.11o: In the present world, there are many stores full of draft 802.11n and the estimation had shown that out of the total buyers of these products, 94% of them are from small business enterprises and consumers who are unknown to the standards issues. Majority of the corporate or enterprise users are not using these drafts products (Corrado 2016). The possibility of the products is not compliant with the final standards of the process. The incomplete technology would result in causing the potential headaches to the users. The technical writers have to promote the 802.11n heavily for the trade journals although AIR802 in USA has polled to have 98% of people no interest in 802.11n. After the rating of the standard and the proving of the technology and products, the other countries and USA have started to take interest in the technology (Cam-Winget, Popa and Hui 2017). The AIR802’s majority of customers are working as government agents, computer network companies, and the value added resellers. The consumers and distributors and the various companies that specializes in installing wireless products for both small working environment and residential are also a part of AIR802 (Bedogni et al. 2014). Most of the buyers of AIR802 have taken caution for adopting the 802.11n as a standard for their working sphere.
The most crucial concern for the development of the network connection among the users for any of the small and medium enterprise and residential operation is helpful for listing the desired operation for the integration. The lack of the desired signal coverage is a major setback for the users as it hampers the reliability of the operations. The 802.11b/g products have been developed for these users as it would allow them for forming the high RF power output product services (Espina et al. 2014). It is the most desirable output required for operation. The retail stores have a RF output power of limit of 30 to 65 mW. However, with the same expense, a high power of 250mW can be achieved. The comparison tests have yielded that the 802.11b/g routers can provide significantly greater coverage and distance. Considering the wireless network for the internet access and cable modem or DSL as service, the speed is less than the range of 1-6 Mbps depending on the service provider (Bloessl et al. 2015). The typical 25 Mbps output speed can be achieved with the help of a high range of RF that is powered with 802.11b/g router.
For users that require higher speed of data transfer for any specific application, the 802.11n can be considered. The standard of 802.11n has been set for providing better range along with 100 Mbps or greater speed of data transmission. However, the practical demonstration has shown that the existence of other wireless signals and the building materials have considerable impact on the speed of data transmission (Eze, Zhang and Liu 2014). The noises in the signal have caused the decrease of the speed of data transmission as low as 26 Mbps. If the congestion and interference is considered as major factor, 802.11a can be considered (however, it should be considered that 802.11a is not compatible with all devices) (Festag 2014). Hence, it can be said that most of the small businesses are better off without the use of 802.11b/g device powered by a high RF.
Conclusion
From the above report it can be concluded that with the analysis of the IEEE 802.11 standards the best standards can be applied in the network. The security of the wireless network should be maintained and different protocols that can be applied on the wireless network are evaluated for the selection of the best protocol. The deficiencies of the wireless standards are analyzed and the advantages of the network is also highlighted in the report for providing a better understanding on the IEEE 802.11 standards. The paper is prepared for reviewing the wireless technology and comparing the physical standards for the implementation of the wireless lan. The technology issues can be added with the functionality that is expected for the development of the future application. There has been a recent advancement in the connectivity and the communication standards such as 802.11 a, b, g, n and ac. The standards are equipped with the features and capabilities of evolution of the conditions for operations and a study has been made for the comparison of the different IEEE 802.11 standards and its application in different fields of network.
References
Abdelrahman, R.B.M., Mustafa, A.B.A. and Osman, A.A., 2015. A Comparison between IEEE 802.11 n and ac Standards.
Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H. and Zedan, H., 2014. A comprehensive survey on vehicular ad hoc network. Journal of network and computer applications, 37, pp.380-392.
Bedogni, L., Di Felice, M., Malabocchia, F. and Bononi, L., 2014, December. Cognitive modulation and coding scheme economics for 802.11 n and 802.11 af networks. In Globecom Workshops (GC Wkshps), 2014 (pp. 717-722). IEEE.
Bellalta, B., Bononi, L., Bruno, R. and Kassler, A., 2016. Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges. Computer Communications, 75, pp.1-25.
Bloessl, B., Puschmann, A., Sommer, C. and Dressler, F., 2015. Timings matter: Standard compliant IEEE 802.11 channel access for a fully software-based SDR architecture. ACM SIGMOBILE Mobile Computing and Communications Review, 18(3), pp.81-90.
Bray, T., 2017. The javascript object notation (json) data interchange format.
Cam-Winget, N., Popa, D. and Hui, J., 2017. Applicability Statement for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) Networks.
Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless Communications, 23(5), pp.60-67.
Corrado, R., 2016. Audio/Video Transmission over IEEE 802.11 e Networks: Retry Limit Adaptation and Distortion Estimation.
Espina, J., Falck, T., Panousopoulou, A., Schmitt, L., Mülhens, O. and Yang, G.Z., 2014. Network topologies, communication protocols, and standards. In Body sensor networks (pp. 189-236). Springer, London.
Eze, E.C., Zhang, S. and Liu, E., 2014, September. Vehicular ad hoc networks (VANETs): Current state, challenges, potentials and way forward. In Automation and Computing (ICAC), 2014 20th International Conference on (pp. 176-181). IEEE.
Farooq, M.O. and Kunz, T., 2015. Contiki-Based IEEE 802.15. 4 Channel Capacity management and Suitability of Its CSMA-CA MAC Layer Protocol for Real-Time Multimedia Applications. Mobile Information Systems, 2015.
Fay, L., Michael, L., Gómez-Barquero, D., Ammar, N. and Caldwell, M.W., 2016. An overview of the ATSC 3.0 physical layer specification. IEEE Transactions on Broadcasting, 62(1), pp.159-171.
Festag, A., 2014. Cooperative intelligent transport systems standards in Europe. IEEE communications magazine, 52(12), pp.166-172.
Festag, A., 2015. Standards for vehicular communication—from IEEE 802.11 p to 5G. e & i Elektrotechnik und Informationstechnik, 132(7), pp.409-416.
Freudiger, J., 2015, June. How talkative is your mobile device?: an experimental study of Wi-Fi probe requests. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (p. 8). ACM.
Ghandour, A.J., Di Felice, M., Artail, H. and Bononi, L., 2014. Dissemination of safety messages in IEEE 802.11 p/WAVE vehicular network: Analytical study and protocol enhancements. Pervasive and mobile computing, 11, pp.3-18.
Giust, F., Cominardi, L. and Bernardos, C.J., 2015. Distributed mobility management for future 5G networks: overview and analysis of existing approaches. IEEE Communications Magazine, 53(1), pp.142-149.
Kasparick, M., Schlichting, S., Golatowski, F. and Timmermann, D., 2015, August. New IEEE 11073 standards for interoperable, networked point-of-care Medical Devices. In Engineering in Medicine and Biology Society (EMBC), 2015 37th Annual International Conference of the IEEE (pp. 1721-1724). IEEE.
Khorov, E., Lyakhov, A., Krotov, A. and Guschin, A., 2015. A survey on IEEE 802.11 ah: An enabling networking technology for smart cities. Computer Communications, 58, pp.53-69.
Kolias, C., Kambourakis, G., Stavrou, A. and Gritzalis, S., 2016. Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Communications Surveys & Tutorials, 18(1), pp.184-208.
Liang, W., Li, Z., Zhang, H., Wang, S. and Bie, R., 2015. Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, 11(8), p.745303.
Liu, D., Wang, L., Chen, Y., Elkashlan, M., Wong, K.K., Schober, R. and Hanzo, L., 2016. User association in 5G networks: A survey and an outlook. IEEE Communications Surveys & Tutorials, 18(2), pp.1018-1044.
Lyamin, N., Vinel, A., Jonsson, M. and Loo, J., 2014. Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks. IEEE Communications letters, 18(1), pp.110-113.
Ma, Z., Zhang, Z., Ding, Z., Fan, P. and Li, H., 2015. Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives. Science China information sciences, 58(4), pp.1-20.
Nitsche, T., Cordeiro, C., Flores, A.B., Knightly, E.W., Perahia, E. and Widmer, J.C., 2014. IEEE 802.11 ad: directional 60 GHz communication for multi-Gigabit-per-second Wi-Fi. IEEE Communications Magazine, 52(12), pp.132-141.
Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T. and Ladid, L., 2016. Internet of things in the 5G era: Enablers, architecture, and business models. IEEE Journal on Selected Areas in Communications, 34(3), pp.510-527.
Qiao, J., Shen, X., Mark, J.W. and He, Y., 2015. MAC-layer concurrent beamforming protocol for indoor millimeter-wave networks. IEEE Transactions on Vehicular Technology, 64(1), pp.327-338.
Raeesi, O., Pirskanen, J., Hazmi, A., Talvitie, J. and Valkama, M., 2014, May. Performance enhancement and evaluation of IEEE 802.11 ah multi-access point network using restricted access window mechanism. In Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on (pp. 287-293). IEEE.
Rajandekar, A. and Sikdar, B., 2015. A survey of MAC layer issues and protocols for machine-to-machine communications. IEEE Internet of Things Journal, 2(2), pp.175-186.
Rethfeldt, M., Danielis, P., Moritz, G., Konieczek, B. and Timmermann, D., 2015, May. Design and Development of a Management Solution for Wireless Mesh Networks based on IEEE 802.11 s. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 902-905). IEEE.
Shokri-Ghadikolaei, H., Fischione, C., Fodor, G., Popovski, P. and Zorzi, M., 2015. Millimeter wave cellular networks: A MAC layer perspective. IEEE Transactions on Communications, 63(10), pp.3437-3458.
Tian, J. and Xu, L., 2017, October. An Analysis Model of IEEE 802.11 p with Difference Services. In Journal of Physics: Conference Series (Vol. 910, No. 1, p. 012068). IOP Publishing.
Trappe, W., 2015. The challenges facing physical layer security. IEEE communications magazine, 53(6), pp.16-20.
Trivedi, Y., 2016. Ethernet, the networking standard: more mature, more powerful where the whole world is going with ethernet. IEEE Communications Magazine, 54(9), pp.5-11.
Vladyko, A., Paramonov, A., Kirichek, R. and Koucheryavy, A., 2016. Using the IEEE 802.11 Family of Standards for Communication Between Robotic Systems. Advances in Intelligent Systems Research, 133, pp.153-157.
Xie, X., Zhang, X., Kumar, S. and Li, L.E., 2015. pistream: Physical layer informed adaptive video streaming over lte. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (pp. 413-425). ACM.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), pp.20-27.
Ye, H., 2017. 96. Adaptive BEB Algorithm Based on Window Saturation Degree for Wireless System. Boletín Técnico, ISSN: 0376-723X, 55(12).
Zheng, Y. and Li, M., 2015. P-MTI: Physical-layer missing tag identification via compressive sensing. IEEE/ACM Transactions on Networking (TON), 23(4), pp.1356-1366.