• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 389
  • 123
  • 63
  • 54
  • 49
  • 24
  • 23
  • 18
  • 12
  • 10
  • 9
  • 8
  • 6
  • 5
  • 5
  • Tagged with
  • 909
  • 324
  • 300
  • 184
  • 156
  • 155
  • 149
  • 143
  • 127
  • 113
  • 90
  • 86
  • 84
  • 82
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Network Admission Control (NAC)Securing end point devices

Yusuf, Adewale, Lartey, Jerry, Wareus, Vilhelm January 2010 (has links)
<p>There have been remarkable growths in wireless communication networks in</p><p>recent years; this is because of its merits over the wired networks such as</p><p>Mobility and convenience. Wireless networks transmit the signal over the</p><p>open air via radio waves of different frequencies, this makes it to be</p><p>vulnerable to several attacks and anybody on the street can easily intercept the</p><p>wireless data or inject new data into the entire network. There has been</p><p>existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which</p><p>was designed for wireless network security. There were concerns of security</p><p>vulnerabilities in WEP; this made it necessary for the implementation of</p><p>another solution to overcome the weaknesses of the previous wireless</p><p>network security. The IEEE 802.1X (port-based network admission control)</p><p>which is defined on Extensible Authentication protocol (EAP) provides</p><p>effective and efficient admission control to wireless and other networks</p><p>devices [8].</p><p>Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security</p><p>solution, access different vendor solutions, protocols supported and look into</p><p>the inter-operability of these various vendors. In as much as we support the</p><p>premise of NAC being an excellent solution, we will also make brilliant</p><p>recommendations in this thesis to be considered for future refinements of this</p><p>security solution as well as deployment scenarios for the university network.</p>
22

Denial of service attacks on 802.1X security protocol /

Ozan, Orhan. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Geoffrey Xie. Includes bibliographical references (p. 121-122). Also available online.
23

Scheduling in IEEE 802.11e networks with quality of service assurance

Bourawy, Ashraf Ali 28 August 2008 (has links)
Wireless Local Area Networks (WLANs) have gained popularity at an unprecedented rate, at home, at work and in public hot spot locations. In this thesis, a Selectivity Function Scheduler (SFS) is proposed for IEEE 802.11e WLANs. The SFS aims at providing Quality of Service (QoS) assurance for different traffic types such as delay bound and throughput while maintaining fairness among flows and accommodating fluctuations of real-time applications. The SFS defines several functionalities that accurately analyze and compute the number of data frames at each traffic stream’s transmission queue, and allocate adaptive transmission opportunities (TXOPs) to traffic streams based on online observed physical rate instead of minimum physical rate. Moreover, the SFS incorporates a selectivity function (SF) that differentiates between traffic streams and assigns polling priorities accordingly. SFS appropriately calculates variable service interval lengths depending on actual traffic conditions. The SFS scheme is evaluated under different mixes of traffic and for various characteristics of the IEEE 802.11e and compared with the performance of the standard scheduler. Simulation results indicate that the SFS scheme achieves better system performance in terms of high throughput and low packet drop ratio, succeeds in providing QoS assurance for both constant bit rate (CBR) and variable bit rate (VBR) traffic. The SFS scheme also shows higher fairness among users of a same class, as well as between different classes. / Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2008-08-27 14:20:34.806
24

Design of a Fast Location-Based Handoff Scheme for Vehicular Networks

Wang, Yikun 24 October 2013 (has links)
IEEE 802.11 is an economical and efficient standard that has been applied to vehicular networks. However, the long handoff latency of the standard handoff scheme for IEEE 802.11 has become an important issue for seamless roaming in vehicular environments, as more handoffs may be triggered due to the higher mobility of vehicles. This thesis presents a new and fast location-based handoff scheme particularly designed for vehicular environments. With the position and movement direction of a vehicle and the locations of the surrounding APs, our protocol is able to accurately predict several possible APs that the vehicle may visit in the future and to assign these APs different priority levels. APs on higher priority levels will be first scanned. Once a response to scanning from an AP is received, the scanning process ends immediately. A blacklist scheme is also used to exclude those APs that showed no response to the scanning during previous handoffs. Thus, time spent on scanning APs is supposed to be significantly reduced. The simulation results show that the proposed scheme attains not only a lower prediction error rate, but also a lower MAC layer handoff latency, and that it has a smaller influence on jitter and throughput; moreover, these results show that the proposed scheme has a smaller total number of handoffs than other handoff schemes.
25

Denial of service vulnerabilities in IEEE 802.16 wireless networks /

Boom, Derrick D. January 2004 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2004. / Thesis advisor(s): Rex Buddenberg. Includes bibliographical references (p. 69-70). Also available online.
26

QoS provisioning for IEEE 802.11 MAC protocols

Ge, Ye. January 2004 (has links)
Thesis (Ph. D.)--Ohio State University, 2004. / Title from first page of PDF file. Document formatted into pages; contains xiii, 97 p.; also includes graphics (some col.). Includes bibliographical references (p. 94-97).
27

Performance analysis of IEEE 802.11A signals under different operational environments /

Chan, Hsiung Wei Roy. January 2004 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Tri T. Ha, Randy L. Borchardt. Includes bibliographical references (p. 89). Also available online.
28

Wireless local network architecture for Naval medical treatment facilities /

Deason, Russell C. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Alex Bordetsky. Includes bibliographical references (p. 89-93, 95-99). Also available online.
29

A Markov chain approach to IEEE 802.11 WLAN performance analysis

Xiong, Lixiang. January 2008 (has links)
Thesis (Ph. D.)--University of Sydney, 2008. / Includes tables. Includes list of publications. Title from title screen (viewed October 30, 2008). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the School of Electrical and Information Engineering, Faculty of Engineering and Information Technologies. Includes bibliographical references. Also available in print form.
30

Performance analysis of 802.61a /

Allen, Jared L. January 2005 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, June 2005. / Thesis Advisor(s): Tri T. Ha. Includes bibliographical references (p. 71-72). Also available online.

Page generated in 0.0453 seconds