51 |
Specifying, Implementing and Verifying Layered Network ProtocolsCwikla, Joseph J. 02 September 2008 (has links)
No description available.
|
52 |
Industrial WLANNyman, Pontus, Sand, Stefan January 2011 (has links)
WLAN i form av standarden IEEE 802.11 används inte i större utsträckning i industriell miljö. Vi undersöker hur pass protokollet kan användas för datakommunikation i sådan miljö med avseende på störningskänslighet och datorkraftsbehov, i form av en empirisk undersökning. Dessa undersökningar har utförts på en industri med de tre vanligaste standarderna IEEE 802.11b/g/n. Syftet med denna uppsats är att kontrollera vad som stör signalerna samt om den nyaste standarden 802.11n har något nytt som kan revolutionera inriktningen. Tester och undersökningar har visat att 802.11b och 802.11n är bäst när det gäller signalstyrka med störningskällor i omgivningen. 802.11n är överlägsen när det gäller hög överföringshastighet. / WLAN in the form of IEEE 802.11 is not used to any wide extent in the industrial environment. We examine how the protocol can be used for data communication in such an environment with regard to noise immunity and computing power needs, in the form of an empirical investigation. These studies have been conducted in an industrial environment with the three most commonly used standards IEEE 802.11b/g/n. The purpose of this paper is to understand what it is in the environment that disturbs signals and if the newest standard IEEE 802.11n has something new to add to the table that could revolutionize the focus. Tests and studies have shown that 802.11b and 802.11n is the best in terms of signal strength with interference in the environment. 802.11n is superior in terms of high bit rate.
|
53 |
Improving WiFi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift KeyingJohnson, Jacob Edward 16 April 2024 (has links) (PDF)
IEEE 802.11 (WiFi) only has two modes of trust--complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust, but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation scheme that is designed to encode data in the latency of a network. We develop an application, Wicket, that solves the WiFi trust issue using Latency Shift Keying to create a new security association between an untrusted WiFi sensor and a wired device on the trusted network. We evaluate its performance and show that it works in many network conditions and environments.
|
54 |
Centralized Optimization of the Association in IEEE 802.11 Networks / Optimisation centralisée de l'association dans les réseaux IEEE 802.11Amer, Mohammed 12 November 2018 (has links)
Dans cette thèse nous étudions la problématique de l'association dans les réseaux Wi-Fi. Nous proposons des solutions qui permettent à un contrôleur d'optimiser et de gérer d'une manière centralisée les opérations d'association et de réassociation. L'association est exprimée sous forme de problèmes d'optimisations combinatoires. Les modèles proposés tiennent compte des interférences entre les APs et sont conformes avec la méthode d'accès DCF du standard IEEE 802.11. Dans le premier modèle proposé nous avons considéré le cas d'un réseau saturé dans lequel on suppose que chaque AP dispose en permanence de trames à transmettre. Dans ce modèle, nous avons supposé que toutes les stations d'un même AP ont des chances de transmission équivalentes autrement dit le même nombre d'accès au medium. La fonction objectif proposée offre un bon compromis entre l'amélioration du débit des stations et l'équité. Les résultats numériques obtenus sur des simulations réalistes ont montré l'efficacité de cette solution et présentent une amélioration significative des performances du WLAN par rapport à une association basée sur la valeur du RSSI ou par rapport aux approches existantes. Par la suite, étant donné que l'hypothèse d'un réseau tout le temps saturé n'est pas très réaliste, nous avons proposé une solution qui s'appuie sur des mesures réelles telles que les demandes de débit des stations et les taux d'erreur. Notre solution cherche à équilibrer la charge entre les APs. Plus précisément, nous cherchons à diminuer la charge de l'AP le plus chargé dans le WLAN. Pour évaluer cette charge, nous avons proposé un modèle mathématique qui permet d'estimer le BTF « Busy Time Fraction » d'un AP dans n'importe quelle configuration (schéma d'association). Ce modèle est basé sur un réseau de Markov. Le modèle associé au problème d'optimisation permet de proposer la meilleure association. L'évaluation de cette solution par simulation a montré à quel point notre estimation du BTF est précise, et a aussi montré sa capacité à équilibrer la charge entre les APs et à satisfaire la demande en débit des stations. Pour généraliser cette solution aux nouvelles versions du standard IEEE 802.11 comme 802.11n/ac, nous avons adapté le modèle d'estimation du BTF pour qu'il tienne compte des nouvelles améliorations apportées par les couches physiques et MAC du Wi-Fi telles que l'agrégation des canaux, l'agrégation des trames et le bloc d'acquittement. Ainsi, nous avons proposé une nouvelle métrique qui permet d'exprimer à la fois le BTF d'un AP et les taux d'agrégation de trames de chacune de ces stations. L'évaluation numérique de cette solution a montré l'avantage de la nouvelle métrique par rapport au BTF pour améliorer le débit des stations et l'équilibrage de charge dans le WLAN. Il est à noter que, pour la résolution des problèmes d'optimisation combinatoire formulés dans cette thèse, nous avons utilisé des heuristiques de recherche locale itérative. Ces heuristiques sont basées sur une même structure de voisinage, mais les procédures de recherches sont différentes selon la fonction objectif de chaque modèle. Ce choix est justifié par l'efficacité de la recherche locale à fournir des solutions acceptables dans un temps raisonnable pour des problèmes d'optimisation combinatoire complexes / In this thesis we study the problem of association in Wi-Fi networks. We propose solutions that allow a controller to optimize and manage in a centralized way the operations of association and reassociation. Association is expressed as combinatorial optimization problems. The proposed models consider interference between APs and are compliant with the DCF access method of the IEEE 802.11 standard. In the first model proposed we considered the case of a saturated network in which it is assumed that each AP permanently has frames to transmit. In this model, we have assumed that all the stations of the same AP have equivalent chances of transmission, ie the same number of accesses to the medium. The proposed objective function offers a good compromise between improving station throughput and equity. The numerical results obtained on realistic simulations have shown the effectiveness of this solution and show a significant improvement in WLAN performance compared to an association based on the value of the RSSI or compared to existing approaches. Subsequently, since the hypothesis of a saturated network all the time is not very realistic, we have proposed a solution that relies on real measurements such as station throughput requests and the error rates. Our solution seeks to balance the load between APs. Specifically, we seek to reduce the load of the most heavily loaded AP in the WLAN. To evaluate this load, we have proposed a mathematical model that allows to estimate the BTF "Busy Time Fraction" of an AP in any configuration (association scheme). This model is based on a Markov network. The model combined with the optimization problem allows to propose the best association. The evaluation of this solution by simulation has shown how accurate our BTF estimation, and has also shown its ability to balance the load between APs and satisfy the station throughput demands. To generalize this solution to the new versions of the IEEE 802.11 standard such as 802.11n/ac, we adapted the BTF estimation model to take into account the new improvements made by Wi-Fi on physical and MAC layers such as channel aggregation, frame aggregation and block acknowledgment. Thus, we have proposed a new metric that allows to express both the BTF of an AP and the frame aggregation rates of each of its stations. The numerical evaluation of this solution showed the advantage of the new metric compared to the BTF to improve the station throughputs and load balancing in the WLAN. It should be noted that, for the resolution of the combinatorial optimization problems formulated in this thesis, we used iterative local search heuristics. These heuristics are based on the same neighborhood structure, but the search procedures are different depending on the objective function of each model. This choice is justified by the effectiveness of local research in providing acceptable solutions in a reasonable time for complex combinatorial optimization problems
|
55 |
Security of IEEE 802.11b / Säkerhet i IEEE 802.11bSkoglund, Johan January 2003 (has links)
<p>The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important. </p><p>This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.</p>
|
56 |
Adaptation of Wireless Access MAC Protocol for Real Time Packet Flows / Bevielės prieigos MAC protokolo adaptacija realaus laiko duomenų srautamsPavilanskas, Lukas 02 July 2007 (has links)
Topicality of the problem.
Wireless WAN technologies which can provide multimedia services to customer in most cases are implemented by the commercial providers of voice services. Thus technologies are expensive in development of the Hot-Spots, where volatile expanded concentration of customers may be observed. For such purposes the main alternative technologies are the IEEE 802.11.
In modern telecommunications industry the expansion of the IEEE 802.11 networks is one of the fastest growing segment of the telecommunications market. This technology has quickly found a significant place and popularity to provide the typical services of Internet in business, home networking, and etc.
Growing evolution of Internet technologies determines transmitted data flows to take a shape of specific real time multimedia flows features. For such conditions the IEEE 802.11 general technology was not adapted. It is important to develop the new operation methods based on IEEE 802.11 without changing main standard specification. This method lets to adopt an existing in market equipment of IEEE 802.11 for multimedia or voice flows.
The methodology of IEEE 802.11 technological expenditures influence estimation, presented in dissertation, has not been used before. This estimation method allows to evaluate rationality of physical resource utilization and to predict protocol modification directions. Also, method of synchronous voice communication in customer access is proposed. This solution allows... [to full text] / Mokslo problemos aktualumas.
Plačiajuostės licencijuojamų dažnių bevielės technologijos, kurios paprastai skirtos vartotojams teikti komercines multimedijos ir balso paslaugas, yra per brangios vystant prieigos tinklus, kuriuose sutinkama didelė vartotojų koncentracija. Dėl to šios technologijos dažniausiai naudojamos tik komercinių balso paslaugų tiekėjų. Labiausiai tinkama alternatyva – yra IEEE 802.11 technologijos, kurių naudojimas modernių telekomunikacijų tinklų išplėtimui įvairiose tipinėse sąlygose yra pastebimai auganti telekomunikacijų rinkos dalis. Ši technologija greitai išplito ir tapo populiari verslo, namų, „paskutinės mylios“ ir kituose tinklų vystymo sprendimuose.
Modernėjant Interneto technologijoms, telekomunikacijų tinkluose įsivyrauja multimedijos požymių turintys srautai, kurių sukurtoms specifinėms sąlygoms IEEE 802.11 technologijos nėra pritaikytos. Todėl svarbu kurti naujus, ribines galimybes išnaudojančius, bet specifikacijos nekeičiančius protokolus, kurie leistų rinkoje esančią įrangą adaptuoti realaus laiko srautams.
Disertacijoje naudojama IEEE 802.11 MAC protokolo technologinių sąnaudų įtakos vertinimo metodika nebuvo taikoma. Šis vertinimo būdas leidžia įvertinti fizinio resurso užėmimo racionalumą ir numatyti IEEE 802.11 protokolo modifikavimo kryptis. Pateiktas sinchroninis vartotojų prieigos adaptacijos balso perdavimams būdas leidžia racionaliai panaudoti IEEE 802.11 protokolą balsui adaptuotose vartotojų prieigose. Todėl, galima teigti... [toliau žr. visą tekstą]
|
57 |
Bevielės prieigos MAC protokolo adaptacija realaus laiko duomenų srautams / Adaptation of Wireless Access MAC Protocol for Real Time Packet FlowsPavilanskas, Lukas 02 July 2007 (has links)
Mokslo problemos aktualumas. Plačiajuostės licencijuojamų dažnių bevielės technologijos, kurios paprastai skirtos vartotojams teikti komercines multimedijos ir balso paslaugas, yra per brangios vystant prieigos tinklus, kuriuose sutinkama didelė vartotojų koncentracija. Dėl to šios technologijos dažniausiai naudojamos tik komercinių balso paslaugų tiekėjų. Labiausiai tinkama alternatyva – yra IEEE 802.11 technologijos, kurių naudojimas modernių telekomunikacijų tinklų išplėtimui įvairiose tipinėse sąlygose yra pastebimai auganti telekomunikacijų rinkos dalis. Ši technologija greitai išplito ir tapo populiari verslo, namų, „paskutinės mylios“ ir kituose tinklų vystymo sprendimuose.
Modernėjant Interneto technologijoms, telekomunikacijų tinkluose įsivyrauja multimedijos požymių turintys srautai, kurių sukurtoms specifinėms sąlygoms IEEE 802.11 technologijos nėra pritaikytos. Todėl svarbu kurti naujus, ribines galimybes išnaudojančius, bet specifikacijos nekeičiančius protokolus, kurie leistų rinkoje esančią įrangą adaptuoti realaus laiko srautams.
Disertacijoje naudojama IEEE 802.11 MAC protokolo technologinių sąnaudų įtakos vertinimo metodika nebuvo taikoma. Šis vertinimo būdas leidžia įvertinti fizinio resurso užėmimo racionalumą ir numatyti IEEE 802.11 protokolo modifikavimo kryptis. Pateiktas sinchroninis vartotojų prieigos adaptacijos balso perdavimams būdas leidžia racionaliai panaudoti IEEE 802.11 protokolą balsui adaptuotose vartotojų prieigose. Todėl, galima teigti... [toliau žr. visą tekstą] / Topicality of the problem. Wireless WAN technologies which can provide multimedia services to customer in most cases are implemented by the commercial providers of voice services. Thus technologies are expensive in development of the Hot-Spots, where volatile expanded concentration of customers may be observed. For such purposes the main alternative technologies are the IEEE 802.11.
In modern telecommunications industry the expansion of the IEEE 802.11 networks is one of the fastest growing segment of the telecommunications market. This technology has quickly found a significant place and popularity to provide the typical services of Internet in business, home networking, and etc.
Growing evolution of Internet technologies determines transmitted data flows to take a shape of specific real time multimedia flows features. For such conditions the IEEE 802.11 general technology was not adapted. It is important to develop the new operation methods based on IEEE 802.11 without changing main standard specification. This method lets to adopt an existing in market equipment of IEEE 802.11 for multimedia or voice flows.
The methodology of IEEE 802.11 technological expenditures influence estimation, presented in dissertation, has not been used before. This estimation method allows to evaluate rationality of physical resource utilization and to predict protocol modification directions. Also, method of synchronous voice communication in customer access is proposed. This solution allows... [to full text]
|
58 |
Cross-layer techniques for Wireless Local Area Networks / Approche inter-couches dans les réseaux sans filBerezin, Maria Eugenia 19 December 2013 (has links)
Dans cette thèse, nous examinons les aspects essentiels des réseaux locaux sans fil IEEE 802.11 (réseaux WiFi) en mode infrastructure, et identifions les problèmes qui peuvent affecter leurs performances. Après avoir étudié l'état de l'art, nous constatons que de nombreux efforts de recherche ont proposé des solutions diverses mais présentant des limitations qui empêchent leur déploiement dans les réseaux locaux sans fil existants. En outre, les utilisateurs de ces réseaux ont des attentes toujours croissantes de disponibilité, de fiabilité, de réponse instantanée et de sécurité de la part de leurs connexions sans fil. Motivés par ces défis, nous concevons et mettons en œuvre des solutions nouvelles et concrètes aux problèmes ouverts liés à la performance des réseaux locaux sans fil IEEE 802.11. Nous adoptons une approche centrée sur le point d'accès (Access Point), qui n'introduit pas de modifications côté client. Nous nous concentrons sur les aspects suivants des réseaux locaux sans fil : la mobilité des clients, la gestion des canaux, et la qualité de service, et nous explorons trois différents scénarios pour les déploiements les plus répandus : une entreprise, une ville (zone urbaine), et une résidence personnelle (maison ou appartement). Afin de fournir une base commune pour la mise en œuvre pratique de nouvelles solutions 802.11, nous introduisons un modèle de point d'accès intelligent, inspiré des techniques d'auto-gestion. Les contributions principales de cette thèse sont les suivantes : 1. Nous développons une solution de mobilité transparente pour la Voix sur IP (VoIP) dans les réseaux sans fil d'entreprise, appelée Multichannel Virtual Access Point (mVAP), qui n'introduit aucune modification côté client et reste compatible avec les appareils actuels. Nous mettons en œuvre et évaluons mVAP en utilisant du matériel 802.11 standard, et accomplissons une mobilité transparente sans interruption ni dégradation des communications en cours. 2. Nous étudions la possibilité d'exploiter la couverture WiFi existante dans les zones urbaines pour obtenir un accès mobile à Internet, grâce à des simulations réalisées à partir de données réelles collectées par des téléphones portables. Les résultats montrent que cette couverture WiFi est large et que la connectivité offerte peut être efficacement utilisée. Nous identifions des questions ouvertes concernant le déploiement effectif d'un tel réseau WiFi à l'échelle d'une ville, et les applications qui pourraient en bénéficier. 3. Nous proposons un mécanisme dynamique de sélection de canal pour les réseaux locaux sans fil personnels (maisons et appartements), qui utilise la charge de trafic variable dans le temps pour l'estimation d'interférences. Nous mettons en œuvre cette solution en utilisant du matériel 802.11 standard, et nous l'évaluons expérimentalement : les performances d'un tel réseau sont considérablement améliorées en choisissant le canal qui présente le moins d'interférences. / In this dissertation, we examine important aspects of infrastructure IEEE 802.11 Wireless Local Area Networks (WLANs) and identify issues that can affect their performance. Reviewing the state of the art, we observe that numerous research efforts have proposed diverse solutions with several limitations that impede their deployment in existing WLANs. Moreover, users have ever-increasing expectations of availability, reliability, instantaneous response and security from their wireless connections. Motivated by these challenges, we design and implement novel but practical solutions that address open issues affecting the performance of IEEE 802.11 WLANs. We adopt an Access Point (AP)-based approach, which does not require any modification in the clients. We focus on the following aspects of WLANs: client mobility, channel management, and quality of service, and explore three different scenarios for the most common deployments: an enterprise, a city (urban area), and a personal residence (home). To provide a common basis for practical implementation of new 802.11 solutions, we present a Smart AP model, inspired by self-management techniques. The main contributions of this thesis are: 1. We develop a seamless mobility solution for Voice over IP (VoIP) services in Enterprise WLANs, called Multichannel Virtual Access Points (mVAP), which requires no client modifications and is compatible with current devices. We implement and evaluate mVAP using commodity 802.11 hardware, and achieve transparent mobility without interruption or degradation of ongoing communications. 2. We investigate the feasibility of harnessing the existing WiFi coverage in urban areas for mobile Internet access, through trace-based simulations using real data collected by mobile phones. The results show that the WiFi coverage is large and the connectivity it offers can be effectively exploited. We identify open issues for the actual deployment of such a citywide WiFi network and the applications that could benefit from it. 3. We propose an adaptive traffic-aware channel selection mechanism for Home WLANs, that uses the time-varying traffic load for interference estimation. We implement this solution using commodity 802.11 hardware and experimentally evaluate it: the network performance is drastically improved by constantly picking the channel with the least interference.
|
59 |
Optimal Access Point Selection and Channel Assignment in IEEE 802.11 NetworksPark, Sangtae 12 1900 (has links)
Designing 802.11 wireless networks includes two major components: selection of access points (APs) in the demand areas and assignment of radio frequencies to each AP. Coverage and capacity are some key issues when placing APs in a demand area. APs need to cover all users. A user is considered covered if the power received from its corresponding AP is greater than a given threshold. Moreover, from a capacity standpoint, APs need to provide certain minimum bandwidth to users located in the coverage area. A major challenge in designing wireless networks is the frequency assignment problem. The 802.11 wireless LANs operate in the unlicensed ISM frequency, and all APs share the same frequency. As a result, as 802.11 APs become widely deployed, they start to interfere with each other and degrade network throughput. In consequence, efficient assignment of channels becomes necessary to avoid and minimize interference. In this work, an optimal AP selection was developed by balancing traffic load. An optimization problem was formulated that minimizes heavy congestion. As a result, APs in wireless LANs will have well distributed traffic loads, which maximize the throughput of the network. The channel assignment algorithm was designed by minimizing channel interference between APs. The optimization algorithm assigns channels in such a way that minimizes co-channel and adjacent channel interference resulting in higher throughput.
|
60 |
A FEASIBLE ARCHITECTURE FOR LARGE AREA OTH C^2 AND DATA COLLECTION, LEVERAGING DEVELOPED COMMERCIAL TECHNOLOGIESPower, Emilio J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California / Reliable System Services Corporation (RSS Corp.) presents the feasibility of a low cost, low power,
high capacity, robust RF Communications Network using SATCOM and UAV relays. The
developed architecture will be suitable for OTH Large Area Test and Training exercises as well as
applications for OTH Digital Battlefield scenarios. A specific application is shown for the planned
Littoral Combat Ship (LCS) missions, although the developed architecture will have broader
applications for any surface combatant requiring an Over-the-Horizon (OTH) data link to distributed
players and sensors. A conceptual design for the IP network radio system will implement RSS Corp.
developed secure IRIDIUM global full duplex data links and Harris Corp. developed long range high
bandwidth 802.11 full duplex data links.
The results will be significant, and the developed system could be a cornerstone of the future digital
battlefield combat communications architecture. The developed technology will also have
significant use in any application for Test, Evaluation and Training Ranges requiring net centric,
command/control and wide bandwidth TLM data collection from distributed remote players and
sensors.
|
Page generated in 0.0284 seconds