期刊文献+

可自适应选择接入机制的无线局域网研究设计

Research and Design of Wireless LAN with Adaptive Selection of Access Mechanism
下载PDF
导出
摘要 随着无线用户数量的不断增加,用户对数据业务的要求也在不断提高,无线局域网(Wireless Local Area Networks,WLAN)正面临着越来越大的挑战。在高密度的情况下,为改善无线局域网的系统吞吐量和效率,目前的无线局域网接入机制急需优化。为此,本文设计无线局域网的可自适应选择接入机制,设计传输流程,进行可自适应选择接入机制的仿真验证。仿真结果表明,所设计的可自适应选择接入机制性能良好,可有效提升系统的效率,保证用户使用的公平。同时,所设计的可自适应选择接入机制可以有效提升资源利用率。 With the continuous increase of the number of wireless users, the requirements of users for data services are also improving.Wireless Local Area Networks(WLAN) is facing more and more challenges. In the case of high density, in order to improve the system throughput and efficiency of WLAN, the current WLAN access mechanism needs to be optimized. Therefore, this paper designs the adaptive selective access mechanism of WLAN, designs the transmission process, and performs the simulation and verification of the adaptive selective access mechanism. The simulation results show that the designed adaptive selective access mechanism has good performance, can effectively improve the efficiency of the system and ensure the fairness of users. At the same time, the designed adaptive selective access mechanism can effectively improve resource utilization.
作者 高笛烟 黄泽豪 GAO Diyan;Huang Zehao(Maynooth International School of Engineering,Fuzhou university,Fuzhou 35000,China)
出处 《电声技术》 2022年第7期142-146,共5页 Audio Engineering
基金 国家自然科学基金“基于物理层网络编码的随机多址接入技术研究”(No.61871132)。
关键词 自适应选择 接入机制 无线局域网 adaptive selection access mechanism wireless local area networks
  • 相关文献

参考文献13

二级参考文献61

  • 1赵保华,钱兰,郭雄辉.被动测试中网络监测问题[J].天津大学学报,2006,39(7):801-805. 被引量:1
  • 2马建峰,朱建明,等.无线局域网安全-方法与技术[M].北京:机械工业出版社.2007,7.
  • 3胡运松,单洪,马涛.WLAN安全检测与评估系统的设计与实现[J].微计算机信息,2007,23(30):108-110. 被引量:1
  • 4Stubblefield A, Ioannidis J, Rubin A, et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2002: 46-74.
  • 5Ahuja S P, Krishna D. Security Problems in 802.11-based Wireless Networks[C]//Proc. of the 3rd International Conference on Communications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004: 153-164.
  • 6Shu Guoqiang, Lee D. Message Confidentiality Testing of Security Protocols——Passive Monitoring and Active Checking[C]// Proc. of International Federation for Information Processing. [S. l.]: Springer, 2006.
  • 7Shu Guoqiang, Lee D. Testing Security Protocol Properties of Protocol Implementations: A Machine Learning Based Approach[C]//Proc. of International Conference on Distributed Computing Systems. [S. l.]: Springer, 2007.
  • 8Zhang Yongguang, Lee W. Intrusion Detection in Wireless Ad- hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2000: 275-283.
  • 9Wilhelm T. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab[M]. [S. l.]: Syngress, 2010.
  • 10Bacudio A G, Yuan Xiaohong, Chu B T B, et al. An Overview of Penetration Testing[J]. International Journal of Network Security & Its Applications, 2011, 3(6): 19-38.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部