INTRODUCTIONWith the worldwide availability of a large swath of spectrum at the 60 GHz band for unlicensed use, we are starting to see an emergence of new technologies enabling Wi-Fi communication in this frequency band. However, signal propagation at the 60 GHz band significantly differs from that at the 2.4 and 5 GHz bands. Therefore, efficient use of this vast spectrum resource requires a fundamental rethinking of the operation of Wi-Fi and a transition from omnidirectional to directional wireless medium usage. The IEEE 802.11ad amendment addresses these challenges, bringing multi-gigabit-per-second throughput and new application scenarios to Wi-Fi users. These new uses include instant wireless synchronization, high-speed media file exchange between mobile devices without fixed network infrastructure, and wireless cable replacement (e.g., to connect to high definition wireless displays).The most significant difference in 60 GHz propagation behavior is increased signal attenuation. At a typical IEEE 802.11ad range of 10 m, additional attenuation of 22 dB compared to the 5 GHz band is predicted by the Friis transmission equation, resulting from the frequencydependent difference in antenna aperture. In contrast, oxygen absorption plays a minor role over short-range distances, even though it peaks at 60 GHz [1]. Furthermore, 60 GHz communication is characterized by a quasi-optical propagation behavior [2] where the received signal is dominated by the line of sight (LOS) path and first order reflections from strong reflecting materials. As an example, metallic surfaces were found to be strong reflectors and allow non-LOS (NLOS) communication [2]. Concrete materials, on the other hand, cause additional large signal attenuation and can easily create a blockage. Thus, 60 GHz communication is more suitable to in-room environments where sufficient reflectors are present.This article discusses the design assumption resulting from the millimeter-wave (mm-Wave) propagation characteristics and related adaptation to the 802.11 architecture. We further present typical device configurations, an overview of the IEEE 802.11ad physical (PHY) layer, and the newly introduced personal basic service set network architecture. This is followed by an in-depth description of the IEEE 802.11ad beamforming (BF) mechanism and hybrid medium access control (MAC) design, which are the central elements to facilitate directional communication. DIRECTIONAL COMMUNICATIONThe IEEE 802.11ad amendment to the 802.11 standard defines a directional communication scheme that takes advantage of beamforming antenna gain to cope with increased attenuation in the 60 GHz band [1]. With quasi-optical propagation behavior, low reflectivity, and high attenuation, beamforming results in a highly directional signal focus. Based on this behavior, the standard introduces a novel concept of "virtual" antenna sectors [3] that discretize the antenna azimuth. IEEE 802.11ad sectors can be implemented either using precomputed antenna weight vectors for a phased antenna arr...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP's congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive flows. In this paper, we investigate a class of low-rate denial of service attacks which, unlike high-rate attacks, are difficult for routers and counter-DoS mechanisms to detect. Using a combination of analytical modeling, simulations, and Internet experiments, we show that maliciously chosen low-rate DoS traffic patterns that exploit TCP's retransmission time-out mechanism can throttle TCP flows to a small fraction of their ideal rate while eluding detection. Moreover , as such attacks exploit protocol homogeneity, we study fundamental limits of the ability of a class of randomized time-out mechanisms to thwart such low-rate DoS attacks. A shrew is a small but aggressive mammal that ferociously attacks and kills much larger animals with a venomous bite.
Abstract-Multi-hop wireless networks employing random access protocols have been shown to incur large discrepancies in the throughputs achieved by the flows sharing the network. Indeed, flow throughputs can span orders of magnitude from near starvation to many times greater than the mean. In this paper, we address the foundations of this disparity. We show that the fundamental cause is not merely differences in the number of contending neighbors, but a generic coordination problem of CSMA-based random access in a multi-hop environment. We develop a new analytical model that incorporates this lack of coordination, identifies dominating and starving flows and accurately predicts per-flow throughput in a large-scale network. We then propose metrics that quantify throughput imbalances due to the MAC protocol operation. Our model and metrics provide a deeper understanding of the behavior of CSMA protocols in arbitrary topologies and can aid the design of effective protocol solutions to the starvation problem.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.