• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 21
  • 21
  • 20
  • 18
  • 14
  • 12
  • 8
  • 8
  • 7
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

An analysis of the feasibility and applicability of IEEE 802.X wireless mesh networks within the Global Information Grid

Fickel, Mark G., Bach, Eric J. 09 1900 (has links)
Approved for public release; distribution is unlimited / This thesis analyzes the feasibility, functionality, efficacy and usability of IEEE 802.x wireless mesh networks in multiple DoD contexts. Through multiple field and lab experiments and hardware investigations, an assessment is performed on the realistic implementation issues of wireless mesh networks and their possible applications. A detailed examination is conducted of the variable elements, operational constraints, and possible decision points for developing a usable, robust, self-organizing, wireless mesh network that can be leveraged for maximum usability and shared situational awareness in network-centric operations. The research investigates the suitability of currently available COTS hardware and software wireless mesh networking components for geographically distributed networks. Additionally, a product-line software architecture and a common data interchange XML vocabulary are proposed as the enabling technology elements to carry application layer mesh forward for integration of collaborative sensor-decision maker adaptive networks within the Global Information Grid. The thesis includes the design and implementation of the first Naval Postgraduate School testbed for tactical level mesh networking with unmanned vehicles, unattended sensors, and warrior networking nodes. This thesis also lays the groundwork for further research into lower OSI-layer routing protocols for DoD mesh networks, development of mesh-aware applications, as well as a GIG-wide mesh network architecture. / Lieutenant Commander, Supply Corps, United States Navy / Lieutenant Commander, United States Navy
12

An investigation of wireless solutions for the "Last Mile"

Varelas, Antonios K. 03 1900 (has links)
Approved for public release; distribution is unlimited / The need for broadband network access is experiencing rapid growth, but what is currently available is not sufficient. Copper-based technologies cannot address the requirements of today's bandwidth-intensive Internet applications. End-users in the "last mile" demand access speeds equivalent to those supported by fiber optics backbone networks, although, the cost and time associated with its installation are prohibitive factors for bringing fiber to every home and business. This results in the well-known "last mile access problem," which prevents the Internet from reaching its full potential, and has paved the way for the development of many innovative technologies. Driven by demands for more bandwidth, wireless broadband technologies have been proposed. This thesis provides an investigation of two candidates to address the lack of adequate bandwidth in the "last mile," Free Space Optics (FSO), and the IEEE 802.11 Wireless Local Area Networking (WLAN) standard. FSO uses optical signals to deliver information at extremely high data rates, more quickly and cost-effectively than fiber systems. The IEEE 802.11 standard uses radio technology to transfer data. They both use license-free frequency bands for transmission through the atmosphere. They both are quickly deployable, easily scalable, and cheaper than wired solutions, characteristics able to support applications requiring high bandwidth and a high degree of mobility. / Lieutenant Commander, Hellenic Navy
13

SNMP over Wi-Fi wireless networks

Kerdsri, Jiradett 03 1900 (has links)
Approved for public release; distribution is unlimited / Simple Network Management Protocol (SNMP) allows users of network equipment (i.e. Network Administrators) to remotely query the state of any device being tested for system load, utilization and configuration. Windows NT, Windows 2000 and Windows XP Professional are all equipped with SNMP service so that an SNMP manager can communicate with an SNMP agent running on a wireless 802.11b client. However the rest of Windows operating systems, including Windows CE and a Pocket PC, have to run third party proxy SNMP agents in order to be recognized by an SNMP management application. This thesis describes an implementation of a Pocket PC SNMP agent for two Pocket PC mobile devices accessing a wired network via an 802.11b wireless link. As a result of the implementation performed in this thesis, an SNMP manager can wirelessly communicate with a Pocket PC client. However, other results found that only some of the commercially available SNMP managers are able to access the mobile SNMP client and its management information base, due to incompatible implementations of the server and client software. / Lieutenant, Royal Thai Air Force
14

Cooperative Communications in Ad Hoc Networks / Communications Coopératives en Réseaux Ad Hoc

Panichpattanakul, Wasimon 05 November 2010 (has links)
Les techniques de communication coopératives ont été proposées pour améliorer la qualité des signaux reçus par les terminaux sans fil grâce au principe de diversité spatiale. Cette propriété est obtenue par une duplication du signal, envoyé par l’émetteur au niveau d’un terminal relais situé entre l’émetteur et le récepteur. Les travaux de recherche menés en communications coopératives concernent deux domaines principaux: certains traitent la transmission physique alors que d’autres sont étudient l’interaction de la couche physique avec les couches protocolaires supérieures, en particulier les niveaux MAC (Medium Access Control) et réseau. Si ces domaines de recherche sont généralement séparés, des études conjointes s’avèrent nécessaires pour obtenir des systèmes coopératifs implantables. C’est dans ce contexte que se situent les travaux de la thèse avec, comme cadre applicatif, les réseaux ad hoc. En premier lieu, dans la mesure où il n’existe pas de modèle complet de système coopératif, un cadre de modélisation original est proposé pour représenter le fonctionnement d’un système coopératif, sa mise en place et son fonctionnement. Une caractéristique du modèle est de faire abstraction des couches protocolaires. Cette façon de procéder permet d’analyser de façon similaire différentes solutions proposées dans la littérature. De plus, ce modèle facilite la conception de solutions coopératives, en particulier la conception du processus de mise en place du système de coopération qui initialise les rôles de relais, destinataire et source en fonctionnement coopératif. Le modèle de système coopératif est utilisé pour la conception d’une solution de transmission coopérative adaptative où le relais agit en tant que proxy entre la source et le destinataire. L’intérêt de notre proposition, ProxyCoop, par rapport à d’autres propositions, est d’être compatible avec le protocole IEEE 802.11 que ce soit dans son mode de base ou dans son mode optionnel. Pour chaque trame, le mode de transmission à la source est dynamiquement défini soit en mode proxy coopératif soit en mode non coopératif, et ce en fonction de la réception ou la non réception d’un acquittement du destinataire. Les résultats de simulation montrent, sous certaines conditions, une amélioration des performances en termes de nombre de trames effectivement reçues. Le nombre de retransmissions dues à des trames reçues erronées est diminué, et les transmissions en mode multi saut, coûteuses en temps et en bande passante sont également diminuées. Les conditions favorables à la coopération sont dépendantes de la qualité et de l’accessibilité du canal. Une méthode pour la mise en place du système coopératif est également proposée. Elle repose sur l’utilisation d’un protocole standard de routage pour réseaux ad hoc, AODV. Les évaluations de performances indiquent que la mise en place du système de coopération coûte peu en termes de bande passante, les performances du système (mise en place et fonctionnement) sont supérieures à celles d’un système non-coopératif, pour des conditions données. Finalement, l’application de la solution proposée à un réseau ad hoc spécifique, un réseau maillé (mesh) conforme au standard IEEE 802.11s illustre où et comment déployer la solution proposée. / Cooperative communication techniques have been proposed in order to improve the quality of the received signals at the receivers by using the diversity added by duplication of signals sent by relay terminals situated between each transmission pair. Researches related to cooperative communication can be categorized into two fields; Cooperative transmissions and Cooperative setup. The first research field concerns with cooperative transmission techniques in the physical layer while the second research field concerns with issues on inter-layer interaction between cooperative transmissions in the physical layer to protocols in the upper layers (especially the MAC layer and the network layer). These research topics have been separately concerned but, for implementations, they have to work together. Since there is not any existing common frame work to describe entire functions in cooperative communication, we proposed an original framework of cooperative network at the system level called “Cooperative Network Model”. The model does not reflect the protocol layering; thus, we can generalize the cooperation process and obtain an analysis that is available for many solutions. For validity, the proposed model can clearly illustrate and systematically describe existing cooperative setup protocols. In addition, the proposed cooperative network model facilitates us to find and to solve problems in cooperative designs; especially in cooperative setup, which is in charge on the initiation of the terminal’s role (i.e., a source, a relay, and a destination terminal). Thus, we believe that this model can facilitate the design and updating of existing and future propositions in this domain. The cooperative network protocol is used to design an adaptive cooperative transmission called Proxy Cooperative Transmission. In contrast to other adaptive cooperative transmission techniques, our proposition is compatible to both of the basic access mode and the optional access mode of IEEE 802.11 Medium Access Control (MAC) protocol. The transmission mode for each data frame is adaptively switched between a proxy cooperative mode and a non-cooperative mode based on the absence of acknowledge (ACK) frame. Simulation results show that transmission performance is improved by decreasing the number of re-transmissions due to frame errors; thus, chances of multi-hop mode transitions that are costly in time and bandwidth are alleviated. Then, in order to fulfill ProxyCoop communications in part of cooperative setup, we propose a cooperative setup method called “Proxy Cooperative Setup”. The proposition is based on a routing standard protocol for ad hoc networks, AODV, so that it could be easily deployed. The impacts of ProxyCoopSetup when it works with ProxyCoop transmissions have been studied. From simulation results, it shows that ProxyCoop transmissions with ProxyCoopSetup has similar performance to the ProxyCoop transmissions without ProxyCoopSetup. Finally, when the implementation of the proxy cooperative communication and how it can be integrated on existing networks have been considered, it is shown that the design of proxy cooperative communication is also valuable for the 802.11s WLAN Mesh Network environments.
15

Wireless network security: design considerations for an enterprise network

Oh, Khoon Wee 12 1900 (has links)
Approved for public release, distribution is unlimited / Since its introduction in 1999, the Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Network (WLAN) has become the de-facto standard for wireless networking, providing convenient and low cost connectivity. Increasingly, enterprises are extending their networks with 802.11-based WLANs to provide mobility and information-on-the-move for its employees. However, the introduction of WLANs into enterprise networks has raised major concerns about security. A poorly implemented WLAN introduces weaknesses in the enterprise network which can be exploited by attackers, resulting in severe consequences for the enterprise. This thesis was sponsored by the DoD to study the problem of designing a secure wireless architecture for an enterprise network. The specific requirements for the enterprise network were based extensively on DoD and the intelligence community's security guidelines and policies. This thesis provides an indepth analysis into the 802.11 standard and measures how far the standard goes in meeting the specific requirements of the enterprise network. This thesis presents a layered-defense architecture to provide a scalable design for secure wireless networks. A prototype system utilizing XML to control the flow of classified information in wireless networks is also presented. . / Civilian, Defense Science and Technology Agency, Singapore
16

Session hijacking attacks in wireless local area networks

Onder, Hulusi 03 1900 (has links)
Approved for public release, distribution is unlimited / Wireless Local Area Network (WLAN) technologies are becoming widely used since they provide more flexibility and availability. Unfortunately, it is possible for WLANs to be implemented with security flaws which are not addressed in the original 802.11 specification. IEEE formed a working group (TGi) to provide a complete solution (code named 802.11i standard) to all the security problems of the WLANs. The group proposed using 802.1X as an interim solution to the deficiencies in WLAN authentication and key management. The full 802.11i standard is expected to be finalized by the end of 2004. Although 802.1X provides a better authentication scheme than the original 802.11 security solution, it is still vulnerable to denial-of-service, session hijacking, and man-in-the- middle attacks. Using an open-source 802.1X test-bed, this thesis evaluates various session hijacking mechanisms through experimentation. The main conclusion is that the risk of session hijacking attack is significantly reduced with the new security standard (802.11i); however, the new standard will not resolve all of the problems. An attempt to launch a session hijacking attack against the new security standard will not succeed, although it will result in a denial-of-service attack against the user. / Lieutenant Junior Grade, Turkish Navy
17

Synchronization analysis and simulation of a standard IEEE 802.11g OFDM signal

Lowham, Keith D. 03 1900 (has links)
Approved for public release, distribution is unlimited / Synchronization of orthogonal frequency-division multiplexed (OFDM) signals is significantly more difficult than synchronization of a single-carrier system. The recently approved IEEE Standard 802.11g specifies a packet-based OFDM system that provides a basis for the discussion of OFDM synchronization in a packet-based environment. Algorithms that synchronize the receiver carrier demodulation frequency and phase, the data frame, the OFDM symbol timing, and the data symbol timing are discussed and analyzed in an AWGN channel. System View simulation is used to implement the frame and carrier frequency synchronization algorithms, where the performance of these algorithms is analyzed and they are shown to be useful detection algorithms for Standard 802.11g signal reception. / Lieutenant Commander, United States Navy
18

Analysis of hardware requirements for airborne tactical mesh networking nodes / An analysis of tactical mesh networking hardware requirements for airborne mobile nodes

Milicic, Gregory J. 03 1900 (has links)
Approved for public release, distribution is unlimited / Wireless mesh mobile ad hoc networks (MANETs) provide the military with the opportunity to spread information superiority to the tactical battlespace in support of network-centric warfare (NCW). These mesh networks provide the tactical networking framework for providing improved situational awareness through ubiquitous sharing of information including remote sensor and targeting data. The Naval Postgraduate School's Tactical Network Topology (TNT) project sponsored by US Special Operations Command seeks to adapt commercial off the shelf (COTS) information technology for use in military operational environments. These TNT experiments rely on a variety of airborne nodes including tethered balloon and UAVs such as the Tern to provide reachback from nodes on the ground to the Tactical Operations Center (TOC) as well as to simulate the information and traffic streams expected from UAVs conducting surveillance missions and fixed persistent sensor nodes. Airborne mesh nodes have unique requirements that can be implemented with COTS technology including single board computers and compact flash. / Lieutenant, United States Navy
19

An analysis of the feasibility of implementing ultra wideband and mesh network technology in support of military operations

Herzig, Joseph F., Jr. 03 1900 (has links)
Approved for public release, distribution is unlimited / This thesis analyzes the feasibility, functionality, and usability of Ultra Wideband technology as an alternative to 802.11 in wireless mesh networks for multiple DoD contexts. Ultra wideband and wireless mesh network technologies and applications are researched and analyzed through multiple field and lab experiments for usability in current, real-world situations. Hardware and software investigations are conducted to determine any implementation issues between ultra wideband and wireless mesh networks. A detailed assessment is conducted of the various elements and operational constraints for developing an ultra wideband mesh network that can be utilized to improve situational awareness in network-centric operations. Through joint research with Lawrence Livermore National Laboratories, various hardware and software components are developed to create a test bed for tactical level ultra wideband and mesh networking experimentation in a highly mobile environment. This thesis also lays the groundwork into future ultra wideband and mesh networking applications. / Lieutenant, United States Navy
20

An analysis of network and sensor performance within IEEE 802.x wireless MESH networks in the Tactical Network Topology (TNT)

Davis, Joseph A., Sr. 03 1900 (has links)
Approved for public release, distribution is unlimited / The objective of this research is to analyze the network performance and sensor functionality, efficacy and usability of IEEE 802.x wireless MESH networks within a DoD Tactical network environment. Multiple sensor configurations operating with wireless MESH network technologies will be researched and analyzed for performance in expeditionary environment situations. Specifically, this thesis will attempt establish the foundation for the development of wireless MESH "network health" models by examining the performance of sensors operating within a MESH network and define which network performance metrics equate to good quality of service. This research will experiment with different application, sensor, and network configurations of currently available COTS components, such as, voice, video and data hardware. This thesis will lay the groundwork for wireless network MESH predictability, which will enable the optimal use of sensors within a tactical network environment. / Lieutenant Commander, United States Navy

Page generated in 0.0403 seconds