Wireless Internet Research Papers - Academia.edu (original) (raw)

The aim of this paper is to characterize the behavior of the UDP transport protocol, mainly in terms of throughput and average delay, over an IEEE 802.11b compliant wireless local area network (WLAN) from an experimental approach.... more

The aim of this paper is to characterize the behavior of the UDP transport protocol, mainly in terms of throughput and average delay, over an IEEE 802.11b compliant wireless local area network (WLAN) from an experimental approach. Although performance evaluation of these kinds of LAN is being extensively discussed in the current literature, most of these studies are analytical or simulation-based and they do not consider the influence of channel impairments or link quality over network throughput. After an exhaustive measurement campaign, different performance parameters such as throughput, goodput, effective goodput, frame error rate, IT loss rate, delay and jitter have been obtained. This could be a preliminary analysis of the behavior of real-time traffic over WLAN infrastructures, such as streaming audio and voice transmission, services that are expected to undergo substantial growth in the coming years. All these studies and results have been developed in the context of the WINE (Wireless Internet Networks) project belonging to the framework of the Information Society Technologies (IST) programme, addressed to enhancing the performance of TCP/IP protocol over WLAN such as IEEE 802.11, Bluetooth and HIPERLAN/2

As a developing country, Bangladesh has done remarkably well in last couple of years in case of adopting internet technology. This study examines whether there is difference in satisfaction between male and female youngsters in respect of... more

As a developing country, Bangladesh has done remarkably well in last couple of years in case of adopting internet technology. This study examines whether there is difference in satisfaction between male and female youngsters in respect of 14 variables. To achieve this objective total 100 youngsters have been considered. The difference in satisfaction is determined by one-way ANOVA analysis. The findings reveal that there are only three variables in which there is difference in satisfaction between male and female youngsters.

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security... more

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.

The phenomenal success of the web provides museum organizations an ideal medium for communication, documentation, promotion, advertisement, dissemination of cultural activities and marketing. Museum shops, which nowadays represent... more

The phenomenal success of the web provides museum organizations an ideal medium for communication, documentation, promotion, advertisement, dissemination of cultural activities and marketing. Museum shops, which nowadays represent integral parts of the museums, have also a lot to benefit from a successful presence on the web arena. In addition to traditional web sites, carefully designed electronic commerce (e-commerce) sites may increase the potential of museum shops offering possibilities for on-line shopping ...

This paper describes realization of a low-cost transceiver based on direct modulation and demodulation at 23 GHz. The system is designed for bit rates from 34 to 52 Mbit/s with shaped OQPSK modulation. Carrier recovery is performed by... more

This paper describes realization of a low-cost transceiver based on direct modulation and demodulation at 23 GHz. The system is designed for bit rates from 34 to 52 Mbit/s with shaped OQPSK modulation. Carrier recovery is performed by decision feedback Costas loop with voltage control dielectric resonator oscillator (VCDRO). Transmitter frequency tolerances and VCDRO temperature drift are compensated by high carrier recovery pull in range of 5.2 MHz. Complete receiver dynamics from -82 to -20 dBm is obtained only by baseband AGC circuitry. All spectrum shaping and interference suppression characteristics are fulfilled by analogue baseband filtering

Notice of Violation of IEEE Publication Principles"A Dynamic Distributed Diagnosis Algorithm for an Arbitrary Network Topology with Unreliable Nodes and Links,"by Pabitra Mohan Khilar and Sudipta Mahapatra,in the Proceedings of the... more

Notice of Violation of IEEE Publication Principles"A Dynamic Distributed Diagnosis Algorithm for an Arbitrary Network Topology with Unreliable Nodes and Links,"by Pabitra Mohan Khilar and Sudipta Mahapatra,in the Proceedings of the International Conference on Advanced Computing and Communications, 2007. ADCOM, Dec. 2007, pp. 125-130After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:"A Distributed Network Connectivity Algorithm,"By E. Procopio Duarte Jr. and A.Weber,The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003 April 2003, pp. 285-292This paper presents a distributed network diagnosis (DND) algorithm for an arbitrary network topology where every node needs to record the status of every other nodes and links assuming the nodes and links are subjected to crash and value faults in a dynamic fault environment (the node's or link's status may change during execution of algorithm). The algorithm operates correctly in each connected component if the network is partitioned due to a set of faulty links or faulty nodes. The worst-case bounds for diagnostic latency is at most O(td) rounds where t is the number of dissemination trees and d is the diameter of the network. The proposed approach uses non-broadcasting method of message dissemination that has similar diagnostic latency with flooding [4] and similar message co- mplexity with Chinese Agent [14] method of message dissemination respectively.

We describe a novel link layer architecture to enhance the performance of Internet protocols over wireless links. The degraded performance of these links on the Internet and the inadequacy of existing approaches of overcoming these... more

We describe a novel link layer architecture to enhance the performance of Internet protocols over wireless links. The degraded performance of these links on the Internet and the inadequacy of existing approaches of overcoming these problems in a protocol independent manner, motivate our solution. Our link layer provides multiple services and performance feedback to higher layers, thus supporting adaptive protocols and applications. In addition, our approach can serve as the basis for future Internet evolution ...

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security... more

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.