To see the other types of publications on this topic, follow the link: 802.11x.

Dissertations / Theses on the topic '802.11x'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic '802.11x.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Shah, Vishal, and Todor Cooklev. "THROUGHPUT AND LATENCY PERFORMANCE OF IEEE 802.11E WITH 802.11A, 802.11B, AND 802.11G PHYSICAL LAYERS." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605337.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>IEEE 802.11e is an amendment of the medium-access control (MAC) layer of the standard for wireless local area networking IEEE 802.11. The goal of 802.11e is to provide 802.11 networks with Quality of Service (QoS). 802.11 has three physical layers (PHY) of practical importance: 802.11b, 802.11a, and 802.11g. 802.11a and 802.11g provide data rates between 6 and 54 Mbps, and 802.11b provides data rates of 5.5 Mbps and 11 Mbps. However these data rates are not the actual t
APA, Harvard, Vancouver, ISO, and other styles
2

Labuda, Adam. "Roaming ve WiFi sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377147.

Full text
Abstract:
This work deals with roaming issues in the WiFi network. Takes options from a 802.11 standard view. Factory setting options for fast roaming from CISCO and MikroTik. It proposes to measure and test these networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Thekkekunnel, Roshan G. "Low power communication for 802.11x cards." Diss., Connect to online resource, 2005. http://wwwlib.umi.com/cr/colorado/fullcit?p1430200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.

Full text
Abstract:
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be s
APA, Harvard, Vancouver, ISO, and other styles
5

Kriara, Lito. "Holistic and efficient link adaptation for 802.11x wireless LANs." Thesis, University of Edinburgh, 2014. http://hdl.handle.net/1842/15871.

Full text
Abstract:
Wireless LANs (WLANs), based on the IEEE 802.11 standard, have become the standard means for indoor wireless connectivity. At the same time, the rising number of smart mobile devices, broadband access speeds, and bandwidth hungry applications (e.g., high definition video streaming) have led to an increase not only of usage but also of demand for higher data-rates. This demand for higher rates is being met with newer IEEE 802.11 standards (e.g., 802.11n/ac) that introduce new features and also increase the different possible settings for each feature. Inherent channel variations and the possibl
APA, Harvard, Vancouver, ISO, and other styles
6

Almeida, Ricardo Manuel Gabriel de. "Integração de uma câmera de vigilância num AP 802.11x." Master's thesis, Universidade de Aveiro, 2010. http://hdl.handle.net/10773/5617.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>A evolução da tecnologia contribuiu para o aparecimento do conceito de domótica, sendo desenvolvidos sistemas automatizados com o objectivo de satisfazer as necessidades de uma habitação. A vigilância representa hoje em dia um dos serviços disponibilizados pela automação das habitações, no entanto, apesar do crescimento desta area os custos associados continuam a ser elevados. Neste projecto pretende-se apresentar um sistema de vigilância tendo como base a extensão das funcionalidades de um ponto de acesso (AP). A escolha de um
APA, Harvard, Vancouver, ISO, and other styles
7

Falk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.

Full text
Abstract:
<p>This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market. </p><p>The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.
APA, Harvard, Vancouver, ISO, and other styles
8

Joakim, Carlsson. "CloudMAC Frame Prioritization : QoS and routing of IEEE802.11 frames in a Opendaylight controlled network." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36313.

Full text
Abstract:
Wireless networks are common in large organisations that can cover multiple floors and buildings. Wireless networks become expensive as they grow and more control and coordination is needed to operate and management them. This thesis describes how CloudMAC, a software defined networking solution (SDN), were implemented in OpenDaylight Hydrogen, a SDN controller. CloudMAC reduces complexity in large wireless local area networks. CloudMAC splits access points (AP) into, a physical (accesses the wireless medium) and a logical (handles the processing of data) part. These two part are then placed i
APA, Harvard, Vancouver, ISO, and other styles
9

Eian, Martin. "Robustness in Wireless Network Access Protocols." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-17479.

Full text
Abstract:
Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An adversary can disrupt the availability of a wireless network using denial of service (DoS) attacks. The most widely used wireless protocols are vulnerable to DoS attacks. Researchers have published DoS attacks against IEEE 802.11 local area networks (LANs), IEEE 802.16 wide area networks (WANs) and GSM andUMTS mobile networks. In this work, we analyze DoS vulnerabilities in wi
APA, Harvard, Vancouver, ISO, and other styles
10

Hauenstein, Carlos Dionísio. "Wireless LAN : a grande questão ; 802.11a ou 802.11b?" reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2002. http://hdl.handle.net/10183/3314.

Full text
Abstract:
Este trabalho apresenta, inicialmente, uma análise comparativa detalhada dos dois padrões, IEEE 802.11a e IEEE802.11b, que foram apresentados recentemente pelo IEEE na área de redes sem fio (wireless). São apresentadas as principais diferenças tecnológicas dos dois padrões, no que se refere, principalmente, à arquitetura, funções de controle, segurança, desempenho e custo de implementação destas duas tecnologias de redes wireless. São avaliados também os aspectos de interoperabilidade, quando estas redes são integradas em redes corporativas fixas, que são baseadas, principalmente, em redes Eth
APA, Harvard, Vancouver, ISO, and other styles
11

Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.

Full text
Abstract:
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network,
APA, Harvard, Vancouver, ISO, and other styles
12

Shaikh, Kamil Mohiuddin. "The Performance Evaluation of OFDM Based WLAN (IEEE 802.11a and 802.11g)." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3079.

Full text
Abstract:
ABSTRACT In the past decade there has been a steady growth in development and implementation of wireless Local Area Networks and emerged as in the largest sectors of the telecommunication industry. Wireless local area network (WLANs) provides connectivity, mobility, and much higher performance and achievable data rate. WLAN is a new medium of access technology in the Local Area Network (LAN) world. Mostly WLAN applications are used in public sectors such as airports, banks, hotels, offices, city centres because of the flexibility of the people. Orthongonal Frequency Division Multiplexing OFDM
APA, Harvard, Vancouver, ISO, and other styles
13

Richter, Lars. "Untersuchung und Bewertung von Netzzugangssteuerungen auf Basis des Standards 802.1x (Port-Based Network Access Control)." [S.l. : s.n.], 2005. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11719676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Vigo, John Louis Jr. "Wireless Intrusion Detection Sytem." ScholarWorks@UNO, 2004. http://scholarworks.uno.edu/td/203.

Full text
Abstract:
The decrease in price and the ease of use of wireless network devices make them an attractive alternative to standard wired networks. However, the intrinsic insecurity of wireless media and weaknesses in the standards for use of wireless media leave wireless networks vulnerable to attacks from unauthorized users. The intrinsic insecurity of wireless media results from radio signals extending beyond the networks intended coverage area and the weaknesses in the standards result from the methods used for authorization and privacy. These insecurities restrict the use of wireless networks
APA, Harvard, Vancouver, ISO, and other styles
15

Mölleborg, Gabriel, and Joel Henriksson. "Draft-N 2.0 : En jämförande studie av täckningsgrad och bandbredd i trådlösa nätverk av typ hot-spot med IEEE 802.11A/G respektive IEEE 802.11N Draft 2.0." Thesis, University of Kalmar, School of Communication and Design, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hik:diva-446.

Full text
Abstract:
<p>Rapporten är en jämförande studie av täckningsgrad och bandbredd i trådlösa nätverk av typ hot-spot med IEEE 802.11A/G respektive IEEE 802.11N Draft 2.0. Studien är gjord i tre olika scenarion på Kvarnholmen i Kalmar under april och maj månad 2008.</p>
APA, Harvard, Vancouver, ISO, and other styles
16

Žlůva, Ivan. "Optimalizace bezdrátových WiFi distribuovaných sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228849.

Full text
Abstract:
This thesis describes theoretic proposal and two practical realization of multi - point wireless network, first for communications between two endpoints and second for wireless signal coverage of a structured space. The wireless network is realized by the equipment working in unlicenced 2,4GHz and 5GHz ISM band. The wireless device are configured in three different wireless mods: WDS, WDS bridge and AP. This paper contains short information about IEEE 802.11a/b/g/n standard and associated proprietary wireless specifications. Practical workshop describes several variants connections and present
APA, Harvard, Vancouver, ISO, and other styles
17

Žlůva, Ivan. "Optimalizace bezdrátových WiFi distribuovaných sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229328.

Full text
Abstract:
This thesis describes theoretic proposal and two practical realization of multi - point wireless network, first for communications between two endpoints and second for wireless signal coverage of a structured space. The wireless network is realized by the equipment working in unlicenced 2,4GHz and 5GHz ISM band. The wireless device are configured in three different wireless mods: WDS, WDS bridge and AP. This paper contains short information about IEEE 802.11a/b/g/n standard and associated proprietary wireless specifications. Practical workshop describes several variants connections and present
APA, Harvard, Vancouver, ISO, and other styles
18

Antal, Lukáš. "Audit podnikových WiFi sítí založených na standardu 802.1X." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236477.

Full text
Abstract:
This term project analyzes the security of 802.1X based wireless networks and presents the methodology for auditing these networks. The thesis describes various methods of the EAP authentication protocol used in wireless networks, security risks arising from their usage and recommendations for mitigating these risks. The paper also includes implementation of applications for 802.1X based wireless network audit focusing on the EAP protocol processing.
APA, Harvard, Vancouver, ISO, and other styles
19

Ozturk, Huseyin Selcuk. "Evaluation of secure 802.1X port-based network access authentication over 802.11 wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FOzturk.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bachan, Jiří. "Metodika měření kvality služeb ve Wi-Fi sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217542.

Full text
Abstract:
This work deals with the wireless Wi-Fi networks, that used unlicenced ISM frequency band 2,4 GHz. These wireless networks are very extended in these days and used mainly for the Internet connection. With the multimedia data transfers expanding it’s necessary to ensure the specific quality of service QoS in wireless networks mainly for applications, which are sensitive to delay or packets lost. The main aim of this work is to describe Wi-Fi networks based on IEEE 802.11b/g/n standards, description of QoS techniques according to IEEE 802.11e standard and description of parameters describing QoS
APA, Harvard, Vancouver, ISO, and other styles
21

Pattam, Shoban. "Enhancing Security in 802.11 and 802.1 X Networks with Intrusion Detection." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/1034.

Full text
Abstract:
The convenience and low cost of 802.11-based Wireless Local Area Networks (WLANs) complemented with 802.1 X authentication has led to widespread deployment in the consumer, industrial and military sectors. The combination of wireless signals radiating further than the intended coverage area, flaws in 802.11's basic security mechanisms and vulnerabilities found in 802.1 X have been widely publicized. Military bases and navy ships are open targets for wireless attacks. Wireless Intrusion Detection System (WIDS), provides an additional (external) layer of security by combining intrusion
APA, Harvard, Vancouver, ISO, and other styles
22

Caceres, Francisco A. Swearingin Brad E. "An analysis of 802.11b and 802.16 technologies as part of the tactical internet /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCaceres.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Rex Buddenberg. Includes bibliographical references (p. 153-156). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Swearingin, Brad E. "An analysis of 802.11b and 802.16 technologies as part of the tactical internet." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1997.

Full text
Abstract:
This research evaluates IEEE 802.11b and 802.16 technologies to examine whether these wireless technologies can integrate into the tactical Internet. In order to establish a baseline, the current Marine Corps' systems architecture is analyzed with emphasis placed on mobile forces at the Regimental level and below. A side-by-side comparison between existing communication assets in the Marine Corps inventory, such as the Enhanced Position Location Reporting System (EPLRS) and Single Channel Ground and Airborne Radio System (SINCGARS), and available 802.11b/16 technologies will evaluate whether e
APA, Harvard, Vancouver, ISO, and other styles
24

Guirardello, Marcelus. "Pol?tica de QoS com prioriza??o de acesso ao meio para redes IEEE 802.11." Pontif?cia Universidade Cat?lica de Campinas, 2008. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/507.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:26Z (GMT). No. of bitstreams: 1 Marcelus Guirardello.pdf: 2153688 bytes, checksum: be50be16f89d021ebb7cf89fb146485c (MD5) Previous issue date: 2008-11-21<br>This work presents a proposal of politic that prioritize the access to the wireless medium, considering environment conditions. The QoS policy considers the propagation conditions, through the analyze of the signal to noise ratio and type of service. The prioritization proposal considers each access category (AC) of the 802.11e standard, using queues with different priorities. The proposal u
APA, Harvard, Vancouver, ISO, and other styles
25

Fontolan, Luis Fernando. "Pol?tica de QoS para redes IEEE802.11 com sele??o de taxa de servi?o baseada em ?ndice de justi?a." Pontif?cia Universidade Cat?lica de Campinas, 2010. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/515.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:30Z (GMT). No. of bitstreams: 1 Luis Fernando Fontolan.pdf: 1957918 bytes, checksum: c54c21cddbc7cc91dd162510efebc7c4 (MD5) Previous issue date: 2010-02-26<br>The IEEE802.11 standard assumes that the stations (STAs) of a communications network have the same condictions during medium access, through the usage of the DCF (Distributed Coodination Function). The DCF states that all stations have the same probability of medium access, regardless of transmission rates or signal to noise ratios. Furthermore, such networks also presents an anomaly by wh
APA, Harvard, Vancouver, ISO, and other styles
26

Žiška, Jiří. "Srovnání použití bezdrátových sítí 802.11 a/b/g/n a E-band v praxi." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237198.

Full text
Abstract:
This master's thesis compares wireless technologies which they are used at current time. The most of information in this thesis are obtained from my practical experiences with design and realization of wireless network during last four years. The thesis briefly describes standards and security of WiFi. More time is devoted to the description of new standard 802.11n and the E-Band. The use of E-Band is allowed in Czech Republic from a year 2008. The thesis describes a practical evaluation of wireless network 802.11a/b/g/n and E-Band. Examples of the use are described in case studies of high-spe
APA, Harvard, Vancouver, ISO, and other styles
27

Doležal, Jan. "Minimalizace vlivu rušení na bezdrátovou síť." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217521.

Full text
Abstract:
This thesis is concerned the technology with technologies of transfer through wireless devices. It is about possibilities of optimization of transfer in wireless net, especially of the reduction of interference influence. The first part is about theory and the standards development of wireless technology. There are methods and principles used in wireless technologies. The second part is a practical measuring and testing of an internal wireless net, with the emphasis being on the source of interference influence. Measuring was focused on interference between access points and was not about mete
APA, Harvard, Vancouver, ISO, and other styles
28

Daldoul, Yousri. "Transport Multicast fiable de la vidéo sur le réseau WiFi." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2013. http://tel.archives-ouvertes.fr/tel-00919403.

Full text
Abstract:
Le transport multicast est une solution efficace pour envoyer le même contenu à plusieurs récepteurs en même temps. Ce mode est principalement utilisé pour fournir des flux multimédia en temps réel. Cependant, le multicast classique de l'IEEE 802.11 n'utilise aucun mécanisme d'acquittement. Ainsi, l'échec de réception implique la perte définitive du paquet. Cela limite la fiabilité du transport multicast et impact la qualité des applications vidéo. Pour résoudre ce problème, 802.11v et 802.11aa sont définis récemment. Le premier amendement propose Direct Multicast Service (DMS). D'autre part,
APA, Harvard, Vancouver, ISO, and other styles
29

Mignani, Simone. "Metodologie per Neighbor Discovery, Transmission Power Control, Dynamic Channel Assignment in IEEE 802.11ac e IEEE 802.11ax." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Col passare degli anni, le reti Wi-Fi stanno diventando sempre più utilizzate e il traffico di rete è aumentato in maniera esponenziale, creando così delle possibili interferenze tra reti wireless adiacenti (per esempio tra la nostra rete domestica e quella del vicino), che potrebbero andare a danneggiare le prestazioni delle reti interessate. All'interno di questo elaborato, vengono trattate tre metodologie come Neighbor Discovery, Transmission Power Control e Dynamic Channel Assignment che sono molto utili per contrastare il calo delle prestazioni all'interno delle reti Wi-Fi. Dopo aver intr
APA, Harvard, Vancouver, ISO, and other styles
30

Minack, Enrico. "Evaluation of the influence of channel conditions on Car2X Communication." Master's thesis, Universitätsbibliothek Chemnitz, 2005. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200501571.

Full text
Abstract:
The C2X Communication is of high interest to the automotive industry. Ongoing research on this topic mainly bases on the simulation of Vehicular Ad Hoc Networks. In order to estimate the necessary level of simulation details their impact on the results needs to be examined. This thesis focuses on different channel models as the freespace, shadowing, and Ricean model, along with varying parameters. For these simulations the network simulator ns-2 is extended to provide IEEE 802.11p compliance. However, the WAVE mode is not considered since it is still under development and not finally approved.
APA, Harvard, Vancouver, ISO, and other styles
31

Montes, Moscol Eduardo. "Estudio de la migración del estándar 802.11 al 802.16 en zonas rurales / Eduardo Montes Moscol." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2008. http://tesis.pucp.edu.pe/repositorio/handle/123456789/209.

Full text
Abstract:
Se plantea la posibilidad de migrar a IEEE 802.16 (WiMAX) en los lugares donde se usa WiFi como solución tecnológica ya que la primera es una tecnología inalámbrica diseñada para redes MAN que no solo permite conectividad inalámbrica sino también velocidades de banda ancha; lográndose llenar los vacíos que deja WiFi. De esta manera se estaría fomentando el acceso universal el cual es un componente en la estrategia del desarrollo de las telecomunicaciones en el Perú.<br>Tesis
APA, Harvard, Vancouver, ISO, and other styles
32

Getraide, Michel. "Security and authentication for 802.11 wireless networks." ScholarWorks@UNO, 2004. http://louisdl.louislibraries.org/u?/NOD,105.

Full text
Abstract:
Thesis (M.S.)--University of New Orleans, 2004.<br>Title from electronic submission form. "A thesis ... in partial fulfillment of the requirements for the degree of Master of Science in the Department of Computer Science."--Thesis t.p. Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
33

Envik, Richard, Niclas Kullberg, and Martin Johansson. "Frekvensstörningari IEEE 802.11b nätverk." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

LENAGALA, ROSHAN M. S. "STUDY OF STARVATION ISSUES IN THE IEEE 802.11e MAC LAYER PROTOCOL." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1155326763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Vágner, Adam. "Měření v bezdrátové síti 802.11n se skrytými uzly." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220192.

Full text
Abstract:
The current large concentration of wireless networks brings new horizons, but also new concerns. Failure to follow basic rules may produce far-reaching problems that could make more wrinkles to all affected managers and administrators. The aim of this thesis was to measure and compare the radio parameters of selected products and how they behave in neighboring interference and the speed they have while there are hidden nodes. The resulting values were measured in the laboratory network Wificolab and compared with the various support protocols. Possible effects on the specific situation are als
APA, Harvard, Vancouver, ISO, and other styles
36

Ferreira, Gildevane Aparecido. "Avalia??o de transmiss?o de fluxo cont?nuo de v?deo em redes IP sem fio Padr?o IEEE 802.11b e 802.11g." Pontif?cia Universidade Cat?lica de Campinas, 2008. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/498.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:22Z (GMT). No. of bitstreams: 1 Gildevane Aparecido Ferreira.pdf: 3776872 bytes, checksum: 2024d74a9d885d3bc67ca267094d9d6c (MD5) Previous issue date: 2008-02-25<br>This MSc. thesis presents new results of activities with the development and characterization on RF devices operating on the 2,4 GHz channel, which has been done using a flat fast fading emulator. This RF emulator has been developed with the use of electronic circuits between them, and the presence of an attenuator which can be controlled by software and another one controlled by a p
APA, Harvard, Vancouver, ISO, and other styles
37

Oliveira, Claudio Xavier de. "Avaliação das tecnologias ClientMatch e dos padrões IEEE 802.11k e 802.11r no suporte a mobilidade e tráfego de tempo real em redes WLAN." reponame:Repositório Institucional da UnB, 2015. http://dx.doi.org/10.26512/2015.10.D.19389.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Instituto de Ciências Exatas, Departamento de Ciência da Computação, Mestrado Profissional em Computação Aplicada, 2015.<br>Submitted by Albânia Cézar de Melo (albania@bce.unb.br) on 2016-01-28T11:53:24Z No. of bitstreams: 1 2015_ClaudioXavierOliveira.pdf: 6916242 bytes, checksum: 945503a644d7ced55dd003d0dad373a3 (MD5)<br>Approved for entry into archive by Raquel Viana(raquelviana@bce.unb.br) on 2016-01-28T18:44:42Z (GMT) No. of bitstreams: 1 2015_ClaudioXavierOliveira.pdf: 6916242 bytes, checksum: 945503a644d7ced55dd003d0dad373a3 (MD5)<br>Ma
APA, Harvard, Vancouver, ISO, and other styles
38

Lu, Cheng, Paul Cook, John Hildin, and John Roach. "The Design of a High-Performance Network Transceiver for iNET." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606169.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>A critical element of the proposed iNET architecture is the development of a telemetry network that provides two-way communication between multiple nodes on both the ground and in the air. Conventional airborne telemetry is based on IRIG-106 Chapter 4 and provides only a serial streaming data path from the aircraft to the ground. The network-centric architecture of iNET requires
APA, Harvard, Vancouver, ISO, and other styles
39

Sedlák, Břetislav. "Zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218192.

Full text
Abstract:
Master thesis focuses on wireless network security. The thesis is divided in two parts. First part describes today’s used standards and their components, topology and security methods as stealth SSID, MAC addresses filtration, WEP, WPA and WPA2. The last three methods are described in detail. In second part there are realized attacks on above described methods of security. There are described attacks on WEP as KoreK chopchop attack, fragment attack, attack FMS, KoreK and attack PTW. Then is described the dictionary attack on passphrase by WPA/WPA2 with PreShared Key authentication obtaining, p
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Isaac Chien-Wei. "A Novel Design and Implementation of DoS-Resistant Authentication and Seamless Handoff Scheme for Enterprise WLANs." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5076.

Full text
Abstract:
With the advance of wireless access technologies, the IEEE 802.11 wireless local area network (WLAN) has gained significant increase in popularity and deployment due to the substantially improved transmission rate and decreased deployment costs. However, this same widespread deployment makes WLANs an attractive target for network attacks. Several vulnerabilities have been identified and reported regarding the security of the current 802.11 standards. To address those security weaknesses, IEEE standard committees proposed the 802.11i amendment to enhance WLAN security. The 802.11i standard has
APA, Harvard, Vancouver, ISO, and other styles
41

Kassab, Mohamed. "Layer-2 hancover optimization for intra-technologies and inter-technologies mobility." Télécom Bretagne, 2008. http://www.theses.fr/2008TELB0098.

Full text
Abstract:
De nos jours, la démocratisation des réseaux sans fil a permis l'émergence de nombreuses applications qui profitent de la mobilité. Cependant, la gestion de cette mobilité et en particulier de la procédure de handover (HO) introduit des délais et des interruptions dans les communications, ce qui viole les contraintes temps-réel imposées par certains types d'applications. Les HOs posent des problèmes d'autant plus importants que des mécanismes supplémentaires sont mis en place pour sécuriser l'accès au réseau ou pour gérer la qualité de service. Effet, ils requièrent le plus souvent l'établisse
APA, Harvard, Vancouver, ISO, and other styles
42

Onder, Hulusi. "Session hijacking attacks in wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOnder.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Robert, Pablo Maximiliano. "Reduction in Coexistent WLAN Interference Through Statistical Traffic Management." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/27167.

Full text
Abstract:
In recent years, an increasing number of devices have been developed for operation in the bands allocated by the Federal Communications Commission (FCC) for license-free operation. Given the rules governing devices in these bands, it is possible for interference created by these devices to significantly reduce the overall capacity of these bands. Two such protocols are Bluetooth and IEEE 802.11b. Several methods have been presented in the literature for managing interference between these two devices. However, these approaches are generally not practical, since they either require the purc
APA, Harvard, Vancouver, ISO, and other styles
44

Aksoy, Mustafa. "A Secure Wireless Network Architecture Proposal To Be Used By Governments In Case Of Emergency Situations." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608975/index.pdf.

Full text
Abstract:
Since wireless network technology has advanced swiftly and dropped in price, it became a widely used networking option among numerous organizations and even single home users. In spite of their widespread usage by private sector, wireless networks are still undesired alternative for the governments due to security concerns. Although wireless networks possessed lots of proven and documented security flaws at first, with the latest researches and developments this condition ameliorated by the time and wireless networks became much more robust to various security attacks. In this thesis, a secure
APA, Harvard, Vancouver, ISO, and other styles
45

Firoozbakhsh, Babak. "Studies in Wireless Home Networking Including Coexistence of UWB and IEEE 802.11a Systems." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14487.

Full text
Abstract:
Characteristics of wireless home and office services and the corresponding networking issues are discussed. Local Area Networking (LAN) and Personal Area Networking (PAN) technologies such as IEEE 802.11 and Ultra Wideband (UWB) are introduced. IEEE 802.11a and UWB systems are susceptible to interference from each other due to their overlapping frequencies. The major contribution of this work is to provide a framework for coexistence of the two systems. The interference between the two systems is evaluated theoretically by developing analytical models, and by simulations. It is shown that
APA, Harvard, Vancouver, ISO, and other styles
46

Nankani, Ajeet. "Horizontal Handoffs within WLANs : A detailed analysis and measurement concerning voice like traffic." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92271.

Full text
Abstract:
IEEE 802.11 based Wireless Local Area Networks (WLANs) in addition to being used as access networks for providing traditional data services, are now also being used as access networks for providing realtime services such as VoIP and multimedia streaming. These realtime services are sensitive to latency, hence requiring seamless or low delay service from the lower layers throughout an ongoing session. The IEEE 802.11 standard does not define any technique or algorithm to provide seamless connectivity during the process of handoff, hence it does not require 802.11 based WLANs to provide the same
APA, Harvard, Vancouver, ISO, and other styles
47

Kaman, Štěpán. "Implementace kvality služby v bezdrátových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218097.

Full text
Abstract:
Wireless networks are currently the frequent access connection to the local network or the Internet. Until 2005 there was no support in the 802.11 standard priority data and the use of multimedia services in these networks is problematic. Thesis deals with the standard IEEE 802.11 standard and quality of service support including IEEE 802.11e. They discussed methods of access to transmission medium, differences in the MAC sublayer, the reader issues in the transmission of priority data and the requirements for these data. In Opnet Modeler was created wireless network with access points and sta
APA, Harvard, Vancouver, ISO, and other styles
48

Ellch, Jonathan P. "Fingerprinting 802.11 devices." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FEllch.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2006.<br>Thesis Advisor(s): Dennis Volpano and Chris Eagle. "September 2006." Includes bibliographical references (p. 67). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
49

Babu, Srinivas Bandi Ramesh. "A measurement-based admission control mechanism for wireless local area networks." [Tampa, Fla] : University of South Florida, 2005. http://purl.fcla.edu/usf/dc/et/SFE0001403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Tang, Chee Meng. "Control Channel Vulnerability Analysis of the Institute of Electrical and Electronics Engineers 802.16m-2011 and 802.16- 2009 Standards." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17466.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>The Institute of Electrical and Electronics Engineers (IEEE) 802.16 set of standards, known as Worldwide Interoperability for Microwave Access (WiMAX), is a family of standards widely deployed for wireless network access. Though WiMAX security vulnerabilities have been extensively analyzed, the IEEE 802.16m-2011 standard incorporates the new advanced air interface (AAI), which is substantially different from legacy standards and justifies reexamination on a clean slate. In this research, the vulnerabilities of IEEE 802.16m-2011 control
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!