• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 194
  • 59
  • 37
  • 23
  • 14
  • 12
  • 11
  • 11
  • 6
  • 6
  • 5
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 433
  • 300
  • 205
  • 102
  • 96
  • 79
  • 70
  • 69
  • 66
  • 63
  • 48
  • 47
  • 45
  • 45
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

Efficient Access Control Techniques for Distributed Wireless Communication Networks / 分散型無線通信ネットワークのための高効率アクセス制御技術

Inoue, Yasuhiko 23 March 2015 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第19128号 / 情博第574号 / 新制||情||101(附属図書館) / 32079 / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 守倉 正博, 教授 高橋 達郎, 教授 梅野 健 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
292

A Review of Setup Practices and Procedures for Creating IEEE 802.11 Wireless Community Networks

Theobald, Jae M. 18 September 2004 (has links) (PDF)
IEEE 802.11 wireless networking equipment has made it possible to bridge the last mile for new broadband internet service providers. Inexpensive wireless networking equipment and high gain antennas enable high speed internet delivery at a fraction of the cost of installing or upgrading land lines for cable or DSL services. Based on this research, a guide of general practices and procedures is proposed for designing, installing, and maintaining a reliable wireless community area network. Included tests have provided performance results for several types of wireless antennas (including wire grid parabolic dishes, Yagi and Vagi styles, and echo backfire), wireless bridges, and other factors which influence overall signal strength and throughput. Two separate configurations are recommended. The first configuration is based on high reliability, longer distances, and low error rates. The second recommendation is based on lower overall cost, ease of installation, and shorter link distances.
293

Hop-by-Hop Transport Control for Multi-Hop Wireless Networks

Scofield, Daniel N. 17 April 2007 (has links) (PDF)
TCP can perform poorly in multi-hop wireless networks due to problems with contention and poor feedback from end-to-end control algorithms. This thesis explores the design of a hop-by-hop transport protocol (HxH). By allowing intermediate nodes to actively participate, the protocol can respond more quickly to changing network conditions and exploit the unique characteristics of wireless networks. Results indicate that hop-by-hop transport can achieve throughput rates that are double those of TCP, depending on the speed of the wireless links.
294

Enhancing Message Privacy In Wired Equivalent Privacy.

Purandare, Darshan 01 January 2005 (has links)
The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some modifications to make it more secure. In this thesis we have proposed a modification to the existing WEP protocol to make it more secure. We achieve Message Privacy by ensuring that the encryption is not breached. The idea is to update the shared secret key frequently based on factors like network traffic and number of transmitted frames. We also develop an Initialization Vector (IV) avoidance algorithm that eliminates IV collision problem. The idea is to partition the IV bits among different wireless hosts in a predetermined manner unique to every node. We can use all possible 224 different IVs without making them predictable for an attacker. Our proposed algorithm eliminates the IV collision ensuring Message Privacy that further strengthens security of the existing WEP. We show that frequent rekeying thwarts all kinds of cryptanalytic attacks on the WEP.
295

Airtime Management for Low-Latency Densely Deployed Wireless Networks / 低遅延稠密無線ネットワークのためのエアタイム管理

Yin, Bo 23 March 2021 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第23327号 / 情博第763号 / 新制||情||130(附属図書館) / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 守倉 正博, 教授 原田 博司, 教授 大木 英司 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
296

Diseño y validación de un método de roaming rápido en capa 2 para una red Wi-Fi con autenticación 802.1X

García Martínez, Jesús, Tejada Latorre, Joel 29 March 2019 (has links)
E l trabajo desarrollado en la presente tesis consiste en el diseño y validación de un método que garantice un roaming rápido, menor a 150 ms, para una red Wi-Fi con el nivel más alto de seguridad recomendado en el estándar 802.11 (WPA2-Enterprise) el cual utiliza un esquema de autenticación por usuario (802.1X). En el primer capítulo, se recorre brevemente la historia de las redes Wi-Fi y se describe cómo el roaming termina siendo determinante para brindar calidad de servicio a diversas aplicaciones de tiempo real. Asimismo, se presentan los objetivos y el alcance del presente trabajo. En el segundo capítulo, se explica brevemente conceptos básicos de redes Wi-Fi. Además, se presenta la enmienda 802.11i la cual indica el nivel de seguridad de una red Wi-Fi y se explica el proceso de asociación a una Red de Seguridad Robusta. En el tercer capítulo, se describe el proceso de roaming, tipos y fases. Además, se explica el impacto del nivel de seguridad en un proceso de roaming. Luego, se presentan los mecanismos y métodos de roaming rápido introducidos por el estándar IEEE 802.11 además del método OKC. En la última sección de este capítulo, se brindan observaciones a los métodos de roaming rápido actuales. En el cuarto capítulo, se indican los requerimientos de diseño que se han considerado para el sistema de roaming rápido. En la segunda parte de este capítulo, se explica el diseño cada etapa del sistema, además de detallarse la implementación de la arquitectura y el método de key Caching seleccionado. En el capítulo final, se presentan las diferentes pruebas que se llevaron a cabo para verificar el funcionamiento del sistema. Por último, se presentan las conclusiones obtenidas de la implementación y las pruebas realizadas sobre el sistema, basadas en los objetivos de la tesis y trabajos que podrían complementar el diseño desarrollado.
297

PERFORMANCE EVALUATION OF MULTIPATH ROUTING WITH MULTICHANNEL AD HOC NETWORKS

TALWAR, SUMEET 30 June 2003 (has links)
No description available.
298

Power Control and Spatial Reusability in Mobile Ad Hoc Networks

Gossain, Hrishikesh 13 July 2005 (has links)
No description available.
299

STUDY OF STARVATION ISSUES IN THE IEEE 802.11e MAC LAYER PROTOCOL

LENAGALA, ROSHAN M.S. 02 October 2006 (has links)
No description available.
300

HANDOFF SCHEMES FOR THE IEEE 802.11 WIRELESS LANs

CHINTALA, VENKATA MANOJ 02 July 2007 (has links)
No description available.

Page generated in 0.0268 seconds