• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 166
  • 48
  • 24
  • 14
  • 12
  • 10
  • 10
  • 9
  • 9
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 363
  • 116
  • 71
  • 67
  • 63
  • 62
  • 46
  • 39
  • 38
  • 34
  • 34
  • 33
  • 33
  • 32
  • 29
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Mitteilungen des URZ 3/2007

Ehrig, Matthias, Heide, Gerd, Richter, Frank, Riedel, Wolfgang, Trapp, Holger, Worm, Stefan 07 August 2007 (has links)
Informationen des Universitätsrechenzentrums
262

Resource management in wireless networks

Pillutla, Laxminarayana S. 05 1900 (has links)
This thesis considers resource management issues in wireless sensor networks (WSNs), wireless local area networks (WLANs), and cognitive radio (CR) networks. Since energy is a critical resource in WSNs, we consider energy minimization techniques based on explicit node cooperation and distributed source coding (DSC). The explicit node cooperation based on space time block codes (STBC) improves energy efficiency of WSNs, by reducing the energy consumption per bit of each sensor node. The DSC on the other hand exploits the spatial correlation in WSNs, and thus reduces the data generated in a WSN. For the purpose of our analysis, we model the spatial correlation according to a linear Gauss-Markov model. Through our numerical results, we observe that the node cooperation combined with DSC can improve energy efficiency for many cases of interest. A unique aspect of our work is we obtain important structural results using the concepts from monotone comparative statics. These structural results provide insights into the general design of WSNs. Through our numerical results, we also demonstrate that, the cooperation based transmission can achieve better mutual information (MI)-energy tradeoff than the non-cooperation based transmission scheme. From the perspective of WLANs, we propose a price based approach to regulate the channel occupancy of low rate users, which is known to be the primary cause for low overall throughput in WLANs. Owing to the decentralized nature of WLANs we use non-cooperative game theory as a tool for analysis. Specifically, we use supermodular game theory. Through our analysis, we show that an increase in price leads to an increase in rate of WLAN users. We also prove that the best response dynamics indeed converge to the Nash equilibrium of the underlying non-cooperative game. Through our numerical results, we demonstrate that by proper tuning of the price, the proposed price based approach can lead to an improvement in overall throughput of a WLAN. Finally from the perspective of CR networks, we consider the impact of number of channels captured by a secondary user on its transmission control protocol (TCP) throughput. From our simulation results it was found that, there exists a definite optimal number of channels a secondary user needs to capture, to maximize its TCP throughput. / Applied Science, Faculty of / Electrical and Computer Engineering, Department of / Graduate
263

Wireless LANs, Real-Time Traffic / Wireless LANs, realtidstrafik

Grape, Torbjörn January 2003 (has links)
The usage of Wireless Local Area Networks is increasing rapidly throughout the world. The technology today is not quality proof for the market’s demands. We want to be able to completely wireless perform our demands, such as confer via video or IP-telephony. This is what we call multimedia real-time traffic. It may be achieved over the physical infrastructure in some areas with good results. The goal of this Master’s Thesis is to analyze the possibilities and give solutions and suggestions to achieve multimedia over the wireless networks, with emphasis on the protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). This Master’s Thesis is a theoretical study and the suggested solutions have not been tested in an actual wireless network. Instead they have been tested by computer simulation to give an indication of improvements. Basic configurations are set to the same as in the IEEE 802.11 standard. Different methods to reach possible improvements of a WLAN are studied, analyzed and simulated. Such methods are: priority, congestion management and multi-channel protocol. Simulations results show how the priority affects the wireless network and how a multi-channel protocol improves the latency and efficiency of the network. The simulation part is concentrated to show improvements of real-time traffic, which is time sensitive. With a multi- channel protocol the network can allow more users, i.e. more traffic. Also, the network will gain improvement in stability.
264

Security of IEEE 802.11b / Säkerhet i IEEE 802.11b

Skoglund, Johan January 2003 (has links)
The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important. This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.
265

Snabb och säker roaming i WLAN / Fast and Secure Roaming in WLAN

Falk, Magnus January 2004 (has links)
This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE. Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i. The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity. This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.
266

Performance Analysis of WLAN MAC Algorithms / Prestanda Analys av WLAN MAC algoritmer

Khoulani, Amer, Samhan, Ramaz January 2010 (has links)
Lately, researchers were trying to put a lot of efforts to enhance the performance of Wireless LANs. IEEE 802.11 algorithm, DCF, was an interesting subject for studies. Most studies were concentrating on avoiding collisions, packets loss, decreasing transmission delay and enhancing the overall performance of the network. Double Increment Double Decrement (DIDD) was introduced as a solution that enhance the performance by applying some changes in the algorithm. The main changes were applied on the Contention Window (CW). IEEE 802.11e introduced a new algorithm (EDCA) that introduces a QoS to the performance and though improves the overall performance of the WLAN This thesis aim is to study the performance of three different MAC algorithms by applying two different scenarios on legacy DCF, DIDD and EDCA. Analyzing different output results and checking the QoS of each algorithm. Simulations are implemented in Network Simulator 2 (ns-2) to simulate the network and communication procedures. By deducing and analyzing the output results of the main simulation, DIDD shows improvements that are slightly better than the legacy DCF, while EDCA shows better results from both DCF and DIDD. Though, EDCA shows a noticeable enhancement in the performance of the WLAN.
267

A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks

Abdullah, Hanifa 12 October 2006 (has links)
Every environment is susceptible to risks and Wireless Local Area Networks (WLANs) based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard are no exception. The most apparent risk of WLANs is the ease with which itinerant intruders obtain illicit entry into these networks. These intrusion security risks must therefore be addressed which means that information security risk analysis and risk management need to be considered as integral elements of the organisation’s business plan. A well-established qualitative risk analysis and risk management methodology, the Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE) is selected for conducting the WLAN intrusion security risk analysis and risk management process. However, the OCTAVE risk analysis methodology is beset with a number of problems that could hamper a successful WLAN intrusion security risk analysis. The ultimate deliverable of this qualitative risk analysis methodology is the creation of an organisation-wide protection strategy and risk mitigation plan. Achieving this end using the OCTAVE risk analysis methodology requires an inordinate amount of time, ranging from months to years. Since WLANs are persistently under attack, there is a dire need for an expeditious risk analysis methodology. Furthermore, the OCTAVE risk analysis methodology stipulates the identification of assets and corresponding threat scenarios via a brainstorming session, which may be beyond the scope of a person who is not proficient in information security issues. This research was therefore inspired by the pivotal need for a risk analysis and risk management methodology to address WLAN intrusion attacks and the resulting risks they pose to the confidentiality, integrity and availability of information processed by these networks. Copyright / Dissertation (MSc (Computer Science))--University of Pretoria, 2006. / Computer Science / unrestricted
268

Netzentwicklung im CSN

Schade, Markus 10 September 2004 (has links)
Das Chemnitzer StudentenNetz (CSN) verwaltet ein mittelgroßes Netzwerk in den Wohnheimen des Studentenwerkes Chemnitz-Zwickau. Mitarbeitern und Interessenten erhalten einen Überblick und Einblick in die vorhandene Netzstruktur und die Konfiguration der verwendeten Technik. Es wird auch auf mögliche Szenarien für zukünftige Entwicklungen eingegangen.
269

Analysis of Internal RF Interferences in Mobile

Balkorkian, Sevag, Hao, Zhang January 2005 (has links)
Nowadays, mobile phones have greater functionality; a camera, color LCD screen, wireless LAN, Bluetooth, IrDA and others. In the near future wider variety of new functionalities will be added, from high quality voice, high definition video to high data rate wireless channels. As consumer electronics integrate greater functionality and high operating frequencies, their emissions will exceed the specified limits, most of these emissions will be a result of the internal interferences in the mobile phone. Moreover higher operating frequencies will be required to improve the quality of these functionalities, something that will make it more difficult to control these interferences. Internal or external sources of electromagnetic interference can degrade the performance of sensitive analog/digital circuits inside the mobile phone. Moreover the electronic device must satisfy a host of global regulations that limit it’s susceptibility to these interferences, as well as the interference emitted by the device itself. Therefore designing a new electronic device to perform new and exciting functions will not be a pleasant task if it can not meet certain specifications and function as required to adhere to certain global regulations. This thesis project investigates the sources of interference inside a mobile phone; mainly the electromagnetic interferences and its effect on the radio transceiver focusing on the GSM receiver sensitivity. This report is a result of intensive research, an investigation of possible sources of interference, also actual measurements were performed; RSSI, OTA and sniffing measurements; to identify the physical sources of interferences, and their effect on the receiver sensitivity. Finally solutions were recommended and implemented to suppress the interferences due to different sources, mainly through filtering, shielding or proper grounding of signals and components/subsystems in the mobile phone.
270

A Compact Universal Antenna System for Automobiles

Che, Jiukun January 2020 (has links)
No description available.

Page generated in 0.0479 seconds