• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 194
  • 59
  • 37
  • 23
  • 14
  • 12
  • 11
  • 11
  • 6
  • 6
  • 5
  • 3
  • 3
  • 3
  • 3
  • Tagged with
  • 433
  • 300
  • 205
  • 102
  • 96
  • 79
  • 70
  • 69
  • 66
  • 63
  • 48
  • 47
  • 45
  • 45
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
351

Efektivita bezdrátových sítí z pohledu služeb / Efficiency of Wireless Networks from Services View

Buchta, Marek January 2010 (has links)
Subject of this thesis was the issue of effectiveness of wireless networks from the perspective of services. Become acquainted with WiFi network standard IEEE 802.11 with protocols and principles of WiFi networks and services. It should be focused on the quality of service QoS. In teoretical part of this thesis are described problems considering wireless networks, layer model and types of nets used in WiFi. Standard IEEE 802.11 is analysed in details including supplements and used packets. Special attention is paid to the quality of service QoS. Next are discussed the principles and application services as VoIP, videoconferencing, video streaming and others in WiFi network. On the basis of obtained knowledge is designed extensive WiFi network with assured supply of services. For modelling and simulation of wireless network is used software development environment Opnet Modeler. Model of wireless network is used to optimize and analyse this wireless communication network. In thesis are also simulated properties of data which are sensitive to delay. In last part of thesis is created a laboratory work, which contains a submission of task, detailed theory, wiring diagram, instructions for elaboration, guidelines for simulation and example of elaboration of task. Work is about comparison of network with used 802.11b and 802.11e standard, and support of quality of service QoS.
352

Optimalizace a analýza závislostí komunikačních služeb na zpoždění / Optimalization and analysis of communication services latency dependencies

Zikmund, Lukáš January 2014 (has links)
This master’s thesis is focused on ensuring of Quality of Service (QoS) in wireless network for standards IEEE 802.11 a/b/g/n. First part of this thesis is focused on the theory of this issue. It covers methods of data transfer in computer networks and individual transfer parameters especially on parameters needed to ensure quality of service. It also describes standards for wireless data transmission and protocols for real time data transmission. The second part is devoted to OPNET modeler and to simulations created on this program. Simulations are focused on real-time data transfer and compare the standards in terms of delay and jitter.
353

Analýza závislostí komunikačních služeb na zpoždění a optimalizace QoS / Analysis of the dependence of communications services to the delay and QoS optimization

Schön, Martin January 2015 (has links)
This thesis discusses wireless network standards 802.11a/b/g/n. First part explains basic principles of networks and media access. Next the standard IEEE 802.11, general QoS parameters and their application in wireless networks, according to standard 802.11e are analyzed. Second part of the thesis verifies the acquired knowledge in simulating program Opnet - effects of the delay, jitter and packet loss on VoIP call are tested. In the last part of the thesis a network for video streaming has been designed. The video was streamed in different qualities and the influence of other network traffic (with and without the support of QoS) on the video streaming was tested.
354

Bezpečnost bezdrátové sítě poskytovatele internetových služeb / Wireless Network Security of Internet Service Provider

Parolek, Pavel January 2013 (has links)
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
355

Návrh rozšíření podnikové sítě o WiFi síť / Proposal of Extension of the Corporate Network by WiFi Network

Chobotová, Jana January 2014 (has links)
This diploma thesis deals with implementation of wireless network to company network. It analyzes current state in the company and suggests appropriate solution. The goal of this thesis is to create a proposal for enabling wireless connection and mobility for users.
356

Nástroj pro generování rámců podle standardu 802.11 / Frame Generator Based on 802.11 Standard

Švanda, Pavel January 2013 (has links)
This thesis describes the design and implementation of the generator frames used for information transfer in wireless networks. At the beginning of the thesis there is described the introduction to the issue of data transmission in wireless networks 802.11 and the analysis of existing tools. Then it is designed language for describing the structure of their own frames and designed their own tools. The work also deals with the subsequent implementation of the resulting tool. Finally the results of the test are mentioned.
357

Theoretische und experimentelle Untersuchung des IEEE 802.11 (WLAN) Handover-Verfahren im Rahmen eines Voice-over-IP Projektes der Firma SIEMENS.

Donner, Sandra 31 January 2005 (has links)
Das Ziel dieser Arbeit ist es, ein Handover-Verfahren für ein Siemens Handset zu entwickeln. Die Entwicklungsumgebung beruht auf den Wireless-LAN Standards 802.11 der IEEE (Institute of Electrical and Electronics Engineers). Dabei liegen die Schwerpunkte auf den Standardisierungen 802.11f und 802.11i, wobei sich eine neue Arbeitsgruppe (IEEE 802.11r) direkt mit dem Thema "Handover" beschäftigen wird. Das Handset soll selbständig die Verwaltung und Einleitung des Handovers übernehmen und lediglich insofern vom Access Point unterstützt werden, dass dieser als Informationssammler dient und somit Entscheidungshilfen geben kann.
358

Denial-of-service attacks against the Parrot ANAFI drone / DoS- attacker mot drönaren Parrot ANAFI.

Feng, Jesse, Tornert, Joakim January 2021 (has links)
As the IoT market continues to grow, so does the need for secure wireless communication. Drones have become a popular gadget among both individuals and various industries during the last decade, and the popularity continues to grow. Some drones use Wi-Fi technology for communication, such as the Parrot ANAFI, which introduces many of the same security threats that are frequently found in general IoT. Therefore, this report covers a common group of cyberattacks, known as denial-of-service attacks, their effects on the Parrot ANAFI, and their ease of use. A threat model was created to have an overview of the system architecture, and all of the identified threats were assessed using DREAD. All of the software tools used in this report can be found for free on the Internet using search engines and simple key words. The results showed that the drone is generally secure, but it is vulnerable to a certain denial-of-service attack, which can open the door to multiple attack surfaces if the password for the drone’s Wi-Fi is not strong enough. Some suggestions for mitigating these threats are presented at the end of the report. / I takt med att IoT-marknaden fortsätter att växa ökar också behovet av säker trådlös kommunikation. Drönare har blivit en populär pryl bland såväl privatpersoner som diverse industrier under det senaste decenniet, och populariteten fortsätter att växa. Vissa drönare använder Wi-Fi-teknik för kommunikation, till exempel Parrot ANAFI, vilket introducerar många av de säkerhetshot som ofta existerar bland IoT i allmänhet. Den här rapporten täcker därför en välkänd grupp av cyberattacker, som kallas denial-of-service-attacker, deras effekter på Parrot ANAFI och deras användarvänlighet. En hotmodell skapades för att ha en överblick över systemarkitekturen och alla identifierade hot rangordnades med hjälp av DREAD. Alla programvaruverktyg som används i denna rapport kan hittas gratis på Internet med hjälp av enkla sökningar på nyckelord. Resultaten påvisar att drönaren i allmänhet är säker, men att den är sårbar för en viss typ av denial-of-service-attack, vilket kan öppna dörren till flera attackytor om lösenordet för drönarens Wi-Fi inte är tillräckligt starkt. Några förslag för att mildra dessa hot presenteras i slutet av rapporten.
359

Diseño e implementación de un sistema de gestión de accesos a una red Wi-Fi utilizando software libre

López Mori, Jorge Alonso 08 May 2012 (has links)
El reciente aumento en la implementación de redes inalámbricas nos obliga a contemplar con más cuidado el aspecto de la seguridad en este tipo de redes. Así como en el caso de las típicas redes de datos con cables (siendo la tecnología Ethernet la más utilizada para estos casos), tiene que asegurarse que los usuarios de una red inalámbrica se encuentren conectados a ésta de una manera segura, teniendo en cuenta que ahora el medio de transmisión ya no se restringe a un cable, sino que se encuentra en todo el ambiente que lo rodea. Debe de comprobarse que el usuario sea quien dice ser (autenticación), que solo tenga acceso a los recursos que le corresponda (autorización) y también llevar a cabo un registro de las actividades que haga dentro de la red (contabilidad); realizando todo esto de una manera segura y sin que sujetos ajenos a la red puedan estar leyendo información confidencial ni mucho menos tratar de modificarla. En esta tesis se tiene pensado explicar el diseño e implementación que se debería de llevar a cabo dentro de un escenario dado para la instalación de una red inalámbrica segura que contemple la administración de sus usuarios por medio de una plataforma de gestión Web basada en PHP, integrada a un servidor de directorios LDAP con compatibilidad hacia implementaciones libres y cerradas de dicho protocolo, un servidor de autenticación RADIUS y un servidor de base de datos MySQL. Se estudiarán los principales aspectos aplicados en redes inalámbricas Wi-Fi, poniendo especial énfasis en la seguridad de la red y de sus usuarios con mecanismos tales como: WPA2 (IEEE 802.11i), 802.1X, EAP, RADIUS, entre otros.
360

Real-time data acquisition and processing of the Magnetic, Angular Rate and Gravity (MARG) sensor

Saliaris, Ioannis R. 06 1900 (has links)
Approved for public release, distribution is unlimited / This research involves the development of a human-body motion tracking system constructed with the use of commercial off-the-shelf (COTS) compo-nents. The problem to be solved is that the data from the motion tracking sensors must be transmitted wirelessly in real time from a microcontroller to a server computer. Due to the fact that the microcontroller does not support a standard OS, widely used PCMCIA cards or USB wireless modules cannot be used. The wireless communication module chosen for this purpose is the DPAC airborne, a highly integrated 802.11b module that can be easily integrated with the microcon-troller. The evaluation of the module was completed in four stages. The first part was to initiate communication with the DPAC module. The second part was to establish communication between the DPAC module and a TCP server. The third part was to establish communication between the microcontroller and the DPAC module. The fourth part was to increase the baud-rate to the desired high value of 230,400 bps. The evaluation result indicates that the DPAC airborne module meets the wireless communication requirements of the motion tracking system. / Lieutenant, Hellenic Navy

Page generated in 0.1634 seconds