Spelling suggestions: "subject:"aireless LANS."" "subject:"fireless LANS.""
11 |
Cooperative wireless networks with QoS guarantees /Ren, Shaolei. January 2008 (has links)
Thesis (M.Phil.)--Hong Kong University of Science and Technology, 2008. / Includes bibliographical references (leaves 92-98). Also available in electronic version.
|
12 |
Exploring wireless network security in Auckland City through warwalking a dissertation submitted to Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS), 2007.Abdul Halim, Syafnidar. January 2007 (has links) (PDF)
Dissertation (MCIS) -- AUT University, 2007. / Includes bibliographical references. Also held in print (xii, 71 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 005.8 ABD)
|
13 |
Prototype system for detecting and processing of IEEE 802.11G signals /Kypriotis, Georgios. Unknown Date (has links) (PDF)
Thesis (M.S. in Electrical Engineering and M.S. in Systems Engineering)--Naval Postgraduate School, 2004. / Thesis Advisor(s): Tri T. Ha. Includes bibliographical references (p. 95-96). Also available online.
|
14 |
An assessment of emerging wireless broadband technologies /Fountanas, Leonidas. January 2001 (has links) (PDF)
Thesis (M.S. in Computer Science) Naval Postgraduate School, Dec. 2001. / "December 2001." Thesis advisor(s): Bert Lundy. Cover title: An assessment of emerging wireless broadband technolofies. Includes bibliographical references (p. 73-75). Also available online.
|
15 |
Design of an outdoor wireless local area network and antenna analysisOudit, Suzanne, Riggs, Lloyd Stephen, January 2006 (has links) (PDF)
Thesis(M.S.)--Auburn University, 2006. / Abstract. Vita. Includes bibliographic references (p.66-67).
|
16 |
Prototype system for detecting and processing of IEEE 802.11G signalsKypriotis, Georgios 09 1900 (has links)
Approved for public release, distribution is unlimited / On the modern battlefield, successful and fast communications is a critical issue. So the need for transmitting information in larger amounts through a military high-speed network increases. Thus the military is seeking viable and effective solutions that may fulfill these requirements in an operational environment. This thesis develops a prototype system based on appropriate low-cost software and hardware solutions. This system is able to detect, analyze and process wireless 802.11g signals. The evaluation of the newly designed system proved that it is effective up to distances of about 400 m with a low packet error rate and could be a useful tool for detecting wireless 802.11g networks. After evaluating the system, it was used for capturing wireless signals so that we would determine the effective transmission range and the data throughput of an 802.11g network. We determined that such a wireless network could be used in military operations because it offers high data rates up to 200 m, while it maintains a connection of the wireless clients for distances up to 400 m. In addition, the performance data collected can be used as guidelines for estimating the expected performance in an operational situation and can provide useful information for successful planning. / Lieutenant, Hellenic Navy
|
17 |
Evaluation of secure 802.1X port-based network access authentication over 802.11 wireless local area networksOzturk, Huseyin Selcuk 03 1900 (has links)
Approved for public release, distribution unlimited / Since wireless technology has been used in Local Area Networks (LAN), our networks are easier to build and are more scalable and mobile than legacy structures. While providing these functionalities, Wireless LAN (WLAN)'s have some security vulnerabilities that should be addressed. Failing to examine the security risks of WLAN technology and take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks. A secure connection to an intranet, which holds critical data and applications, must be the utmost consideration in the effort to protect critical resources. This thesis builds an open-source test-bed for evaluating WLAN security protocols. Moreover, it investigates the suitability of the IEEE 802.1X standard to provide the required security framework to WLANs. This research determines that the IEEE 802.1X could enhance the security level in authentication and privacy by the enabling rekeying process, but would not prevent Denial of Service attacks via unauthenticated management frames. / Turkish Navy author.
|
18 |
Wireless broadcast with physical-layer network coding. / CUHK electronic theses & dissertations collectionJanuary 2013 (has links)
Feng, Shen. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 84-88). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
|
19 |
Voice-over-IP (VoIP) over wireless local area networks (WLAN).January 2004 (has links)
Wang Wei. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 80-83). / Abstracts in English and Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivations and Contributions --- p.1 / Chapter 1.2 --- Organization of the Thesis --- p.4 / Chapter Chapter 2 --- Background --- p.6 / Chapter 2.1 --- IEEE 802.11 --- p.6 / Chapter 2.1.1 --- Distributed Coordination Function (DCF) / Point Coordination Function (PCF) --- p.7 / Chapter 2.1.2 --- Types of Networks --- p.8 / Chapter 2.1.3 --- The 802.11 MAC Sublayer Protocol --- p.9 / Chapter 2.1.4 --- Why CSMA/CA for Wireless LAN? --- p.11 / Chapter 2.2 --- Voice over IP (VoIP) --- p.13 / Chapter 2.2.1 --- Speech Codec --- p.13 / Chapter 2.2.2 --- The H.323 Standard --- p.13 / Chapter 2.3 --- Related Work --- p.15 / Chapter 2.3.1 --- Capacity limits of VoIP over WLAN --- p.16 / Chapter 2.3.2 --- Methods for increasing VoIP capacity over WLAN --- p.16 / Chapter 2.3.3 --- Interference between traffic of VoIP and other applications --- p.18 / Chapter Chapter 3 --- VoIP Multiplex-Multicast Scheme --- p.20 / Chapter 3.1 --- System Architecture --- p.20 / Chapter 3.2 --- Packet Multiplexing and Multicasting --- p.22 / Chapter 3.3 --- Header Compression --- p.24 / Chapter 3.4 --- Connection Establishment --- p.29 / Chapter Chapter 4 --- Capacity Analysis --- p.31 / Chapter 4.1 --- VoIP Capacity Analysis for 802. 11b --- p.31 / Chapter 4.1.1 --- Capacity of Ordinary VoIP over WLAN --- p.32 / Chapter 4.1.2 --- Capacity of Multiplex-Multicast Scheme over WLAN --- p.33 / Chapter 4.2 --- "VoIP Capacity Analysis for 802,11a and 802.11g" --- p.34 / Chapter 4.3 --- VoIP Capacity with VBR Sources --- p.38 / Chapter 4.4 --- Simulations --- p.38 / Chapter Chapter 5 --- Delay Performance --- p.41 / Chapter 5.1 --- Access Delay --- p.42 / Chapter 5.2 --- Extra Delay Incurred by the Multiplex-Multicast Scheme --- p.47 / Chapter Chapter 6 --- VoIP Co-existing with TCP Interference Traffic --- p.49 / Chapter 6.1 --- Ordinary VoIP co-existing with TCP over WLAN --- p.49 / Chapter 6.1.1 --- Problem Caused by TCP Interference --- p.49 / Chapter 6.1.2 --- Solutions --- p.52 / Chapter 6.2 --- M-M VoIP coexisting with TCP over WLAN --- p.53 / Chapter 6.3 --- 802.11e --- p.56 / Chapter 6.3.1 --- EDCA --- p.56 / Chapter 6.3.2 --- ACK Policies --- p.58 / Chapter 6.3.3 --- VoIP over EDCA --- p.58 / Chapter Chapter 7 --- Experimental Validation --- p.61 / Chapter 7.1 --- Transmission Errors --- p.61 / Chapter 7.2 --- Prototype Implementation --- p.62 / Chapter Chapter 8 --- VoIP over Ad Hoc Networks --- p.65 / Chapter 8.1 --- Mobile Ad Hoc Networks (MANET) and Wireless Distributed System (WDS) --- p.65 / Chapter 8.2 --- The M-M Scheme in WDS --- p.67 / Chapter 8.2.1 --- Modified System Architecture --- p.67 / Chapter 8.2.2 --- Delay Performance --- p.68 / Chapter 8.2.3 --- Analysis of M-M Scheme in WDS --- p.69 / Chapter 8.2.4 --- Capacity Improvement --- p.70 / Chapter 8.2.5 --- Delay Improvement --- p.71 / Chapter 8.2.6 --- Spectrum Reuse --- p.71 / Chapter Chapter 9 --- Conclusions --- p.76 / References --- p.80
|
20 |
An improved media access control protocol for wireless LANsLian, Jason Hailin Unknown Date (has links)
Media access control (MAC) protocols play a vital role in determining the performance of wireless local area networks (WLANs). While a variety of MAC protocols have been proposed recently for wireless LANs, the problem of efficient bandwidth utilization, higher throughput, lower mean delay, and fairness has not been fully solved yet. For example, IEEE 802.11 protocol does not perform well and the bandwidth utilization drops below 50% of the total bandwidth under heavy traffic load conditions.Therefore, in order to address these problems of WLANs under heavy traffic load, this thesis proposes a new scheme named Buffer MAC. We analyze the performance of Buffer MAC by using a number of simulation experiments based on ns-2 network simulator. Results show that the proposed Buffer MAC protocol not only improves bandwidth utilization of WLANs but also improves average packet delay, throughput and fairness performance under heavy traffic load conditions.This thesis also contains an exhaustive and comparative study of the new MAC protocol and the original IEEE 802.11 protocol. Some implementation aspects of Buffer MAC protocol are also discussed.
|
Page generated in 0.0277 seconds