Dissertations / Theses on the topic 'WPA2'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'WPA2.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.
Full textAkinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.
Full textVojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.
Full textKlepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.
Full textДегтяренко, А. В. "Аналіз методів захисту бездротових корпоративних мереж." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23021.
Full textМета аналізу: розробити об’єкт дослідження та створити бездротову мережу і покращити її технологію захисту. Та створити резервну систему електроживлення. Технології аналізу:WAP, IEEE 802.11, HTTP, WISP, WIFI. Результат роботи: Використання МАС фільтралізації. створення системи резервного електроживлення та покращення системи захисту. Робота може застосовуватися в комерційних та державних підприємствах та офісах для покращення бездротової системи та усунення хакерьских атак та для захисту інформації.
Eriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.
Full textSyftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:
- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?
- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?
- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?
Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.
Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.
Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.
Full textFalk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.
Full textThis thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.
The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.
Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.
The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.
This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.
Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.
Full textEndrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.
Full textde, Laval johnny. "Trådlösa Nätverk : säkerhet och GPU." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1063.
Full textWireless networks are inherently vulnerable for eavesdropping since they use radio waves to communicate. Wireless networks are therefore protected by encryption. WEP was the first encryption standard that was widely used. Unfortunately WEP proved to have several serious vulnerabilities. WEP could be circumvented within few minutes. Therefore WPA was developed as a response to the weak WEP. Shortly thereafter WPA2 was released and are now being used in present. The only weakness with WPA2 is in the subset WPA2-PSK when weak passwords are being used. Software could easily go through large dictionaries to verify if a password could be recovered. But that is time consuming and therefore providing wireless networks limited protection. However a new area of use with advanced graphic cards has showed that it is providing a faster way of recovering passwords than the ordinary processor on the motherboard. That opens up for the larger use of dictionaries and the processing of words or combinations of words. That is what this study aims to shed light on. How the efficiency of the graphic cards have affected security in wireless networks from a corporate perspective of view.
Вильотніков, В. В. "Модель системи захисту бездротової мережі підприємства." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24846.
Full textМетою кваліфікаційної роботи є проведення аналізу безпеки бездротових мереж, виділення методів їх захисту та розробка моделі системи захисту інформації в бездротовій мережі підприємства. Об'єкт дослідження: процеси забезпечення інформаційної безпеки в бездротових мережах. Предмет дослідження: система захисту інформації в бездротовій мережі. Методи дослідження: Для розв’язання поставлених завдань використовувався комплекс методів, які зумовлені об’єктом, предметом, метою та завданнями дослідження, до яких входять систематизація та узагальнення, описовий, експериментальний метод, метод узагальнення, статистичний метод, метод аналізу і синтезу. Використання цих методів дозволило провести аналіз особливостей захисту інформації в бездротових мережах та розробити універсальну модель системи захисту бездротових мереж. Результати та новизна: систематизовано та узагальнено інформацію про захист інформації в бездротових мережах що міститься в наукових роботах та інших інформаційних матеріалах. Досліджені основні принципи функціонування бездротових мереж. Проаналізовані проблеми захисту бездротових мереж, загрози, вразливості та кібератаки на бездротові мережі. Систематизовано сучасні методи захисту бездротових мереж, виділені їх переваги та недоліки. Розроблена модель системи захисту бездротової мережі підприємства. Запропонована практична реалізація захищеної бездротової мережі на основі обладнання MikroTik RB2011UiAS-2HnD-IN
The purpose of the qualification work is to analyze the security of wireless networks, identify methods for their protection and develop a model of information security system in the wireless network of the enterprise. Object of research: processes of information security in wireless networks. Subject of research: information protection system in a wireless network. Research methods: A set of methods was used to solve the tasks, which are determined by the object, subject, purpose and objectives of the study, which include systematization and generalization, descriptive, experimental method, generalization method, statistical method, method of analysis and synthesis. The use of these methods allowed to analyze the features of information security in wireless networks and to devel- op a universal model of wireless security system. Results and novelty: information on protection of information in wireless networks contained in scientific works and other information materials is systematized and generalized. The basic principles of wireless networks functioning are investigated. Problems of wireless network protection, threats, vulnerabilities and cyber attacks on wireless networks are analyzed. Modern methods of wireless network protection are systematized, their advantages and disadvantages are highlighted. A model of the enter- prise wireless network protection system has been developed. The practical implemen- tation of a secure wireless network based on MikroTik RB2011UiAS-2HnD-IN equip- ment is proposed.
Jelínek, Martin. "Bezpečnost bezdrátových počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218257.
Full textMironov, Georgiana. "Challenges of Wireless Security in the Healthcare Field : A study on the WPA3 standard." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99780.
Full textStehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.
Full textGlöckner, Alexander. "Wireless-LAN im Studentennetzwerk (CSN)." Master's thesis, Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600409.
Full textSedlák, Břetislav. "Zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218192.
Full textParolek, Pavel. "Bezpečnost bezdrátové sítě poskytovatele internetových služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223791.
Full textDančuk, Michal. "Nový model zabezpečení implementovaný v metropolitní síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217507.
Full textBauer, Francisca, Christoph Bremberger, and Margarethe Rammerstorfer. "The Impact of Different Unbundling Scenarios on Concentration and Wholesale Prices in Energy Markets." Forschungsinstitut für Regulierungsökonomie, WU Vienna University of Economics and Business, 2010. http://epub.wu.ac.at/3069/1/wp12.pdf.
Full textSeries: Working Papers / Research Institute for Regulatory Economics
Dockner, Engelbert J., and Long Ngo Van. "International Pollution Control: Cooperative Versus Noncooperative Strategies." Inst. für Volkswirtschaftstheorie und -politik, WU Vienna University of Economics and Business, 1991. http://epub.wu.ac.at/6275/1/WP_2.pdf.
Full textБогданов, Олексій, and Назарій Євгенович Бурак. "Особливості захисту мережі Wi-Fi з протоколом шифрування WPA3." Thesis, Львівський державний університет безпеки життєдіяльності, 2021. http://sci.ldubgd.edu.ua:8080/jspui/handle/123456789/9277.
Full textAloui, Sofiane. "Design of 60ghz 65nm CMOS power amplifier." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14165/document.
Full textTelecommunication industry claims for increasing data rate in wireless communication systems. The major demand of high data rate applications concerns a large panel of home multimedia exchanging data especially for the uncompressed HD data transfer. The 7GHz band around 60GHz is free of use and fulfils the short range gigabit communication requirements. CMOS technology is most appropriate since it drives a fast time to market with a low cost for high integration volume. However, the use of CMOS technology is challenging to satisfy loss and performance trade-off under power constraints. This thesis aims at designing power amplifiers operating at 60GHz with 65nm CMOS technology from STMicroelectronics. This approach is progressive because it is necessary to analyze and optimize the performance of passive and active components constituting the power amplifier using electromagnetic and microelectronics software. Finally, power amplifiers have been made. Their performances met specifications originally defined
Dudebout, Nicolas. "Multigigabit multimedia processor for 60GHz WPAN a hardware software codesign implementation /." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26677.
Full textCommittee Member: Chang, Gee-Kung; Committee Member: Hasler, Paul; Committee Member: Laskar, Joy. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Ross, David Andrew. "Securing IEEE 802.11 wireless LANs." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37638/1/David_Ross_Thesis.pdf.
Full textFranceschinelli, Daniella Arruda. "Estudo comparativo dos aspectos de segurança em redes WWAN, WLAN e WPAN." [s.n.], 2003. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276381.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-03T22:41:04Z (GMT). No. of bitstreams: 1 Franceschinelli_DaniellaArruda_M.pdf: 3740509 bytes, checksum: ea2dbca5dbed86af342ac84113f5ae52 (MD5) Previous issue date: 2003
Resumo: o surgimento e as evoluções das tecnologias wireless proporcionaram maior interesse pela mobilidade, que contribuíram no avanço da comunicação móvel. A crescente utilização das redes sem fios, por um lado, gerou novos negócios nos serviços de comunicação pessoal, mas por outro, trouxe novos problemas relacionados à segurança, tais como a maior exposição dos meios de transmissão e maior complexidade nos processos de autenticação. Este trabalho apresenta inicialmente uma visão geral dos sistemas de redes sem fios GSM, 802.11 e Bluetooth, destacando suas arquiteturas, componentes, funcionalidades e beneficios. Esta apresentação inicial serve como base para discutir os aspectos de segurança nessas redes sem fios e compará-Ios com outras tecnologias existentes no mercado, especialmente quanto aos requisitos de autenticação, confidencialidade, disponibilidade e privacidade
Abstract: The constant evolution 01 wireless technologies have prompted an increasing interest lor mobile computing in general, which in turn have contributed to advancements in mobile communication. If, on one side, wireless networks opened the possibilities for personal service businesses, they also exposed a whole new range 01 serious security issues such as greater exposure 01 the communication media and more complex, and thus more error prone, authentication procedures. This work presents, initially, a broad overview of wireless network systems, specifically GSM, 802.11 and Bluetooth, highlighting its architectures, components, functionalities and positive aspects. This overview is then used as a basis for discussing their security aspects and lor comparing them with other technologies available in the market, specially with regard to authentication, confidentiality and availability
Mestrado
Engenharia de Computação
Mestre em Computação
Lomvall, Thomas, and Sara Klinthammar. "Wardriving : WEP, WPA och WPS inom och mellan städer." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18923.
Full textYang, Libo. "ADVANCED CODING AND MODULATION FOR ULTRA-WIDEBAND AND IMPULSIVE NOISES." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2467.
Full textPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering PhD
Oliviera, Elder Eldervitch Carneiro de. "Antenas de microfita com patch quase-fractal para aplica??es em Redes WPAN/WLAN." Universidade Federal do Rio Grande do Norte, 2008. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15213.
Full textCoordena??o de Aperfei?oamento de Pessoal de N?vel Superior
The microstrip antennas are in constant evidence in current researches due to several advantages that it presents. Fractal geometry coupled with good performance and convenience of the planar structures are an excellent combination for design and analysis of structures with ever smaller features and multi-resonant and broadband. This geometry has been applied in such patch microstrip antennas to reduce its size and highlight its multi-band behavior. Compared with the conventional microstrip antennas, the quasifractal patch antennas have lower frequencies of resonance, enabling the manufacture of more compact antennas. The aim of this work is the design of quasi-fractal patch antennas through the use of Koch and Minkowski fractal curves applied to radiating and nonradiating antenna s edges of conventional rectangular patch fed by microstrip inset-fed line, initially designed for the frequency of 2.45 GHz. The inset-fed technique is investigated for the impedance matching of fractal antennas, which are fed through lines of microstrip. The efficiency of this technique is investigated experimentally and compared with simulations carried out by commercial software Ansoft Designer used for precise analysis of the electromagnetic behavior of antennas by the method of moments and the neural model proposed. In this dissertation a study of literature on theory of microstrip antennas is done, the same study is performed on the fractal geometry, giving more emphasis to its various forms, techniques for generation of fractals and its applicability. This work also presents a study on artificial neural networks, showing the types/architecture of networks used and their characteristics as well as the training algorithms that were used for their implementation. The equations of settings of the parameters for networks used in this study were derived from the gradient method. It will also be carried out research with emphasis on miniaturization of the proposed new structures, showing how an antenna designed with contours fractals is capable of a miniaturized antenna conventional rectangular patch. The study also consists of a modeling through artificial neural networks of the various parameters of the electromagnetic near-fractal antennas. The presented results demonstrate the excellent capacity of modeling techniques for neural microstrip antennas and all algorithms used in this work in achieving the proposed models were implemented in commercial software simulation of Matlab 7. In order to validate the results, several prototypes of antennas were built, measured on a vector network analyzer and simulated in software for comparison
As antenas de microfita est?o em constante evid?ncia nas pesquisas atuais, isso devido ?s in?meras vantagens que apresentam. A geometria fractal aliada ao bom desempenho e comodidade das estruturas planares s?o uma excelente combina??o para projetos e an?lise de estruturas cada vez menores e com caracter?sticas multi-ressonantes e banda larga. Essa geometria tem sido aplicada em antenas tipo patch em microfita para reduzir o seu tamanho e evidenciar o seu comportamento multi-banda. Em compara??o com as antenas em microfita convencionais, as antenas patch quase-fractais apresentam freq??ncias de resson?ncia inferiores, possibilitando a fabrica??o de antenas ainda mais compactas. O objetivo desse trabalho consiste no projeto de antenas patches quase-fractal por meio da utiliza??o de curvas fractais de Koch e Minkowski aplicado ?s margens radiante e n?o-radiante de uma antena inset-fed patch retangular convencional alimentada por linha de microfita com reentr?ncias, inicialmente projetada para a freq??ncia de 2,45 GHz a ser observada. A t?cnica inset-fed ? investigada para o casamento de imped?ncias das antenas fractais, que s?o alimentadas atrav?s de linhas de microfita com reentr?ncias. A efici?ncia dessa t?cnica ? investigada experimentalmente e comparada com simula??es realizadas pelo software comercial Ansoft Designer, usado para a an?lise precisa do comportamento eletromagn?tico das antenas atrav?s do m?todo dos momentos e pelo modelo neural proposto. Nessa disserta??o um estudo bibliogr?fico em teoria de antenas de microfita ? realizado, o mesmo estudo ? realizado a respeito da geometria fractal, dando ?nfase a suas mais diversas formas, t?cnicas de gera??o desses fractais bem como sua aplicabilidade. Este trabalho ainda apresenta um estudo em redes neurais artificiais, evidenciando os tipos/arquitetura de redes utilizadas e suas caracter?sticas, bem como os algoritmos de treinamento que foram utilizados para sua implementa??o. As equa??es dos ajustes dos par?metros para as redes utilizadas nesse trabalho foram deduzidas a partir do m?todo do gradiente. Tamb?m ser? realizada uma investiga??o com ?nfase na miniaturiza??o dessas novas estruturas propostas, indicando o quanto uma antena projetada com contornos fractais ? capaz de miniaturizar uma antena patch retangular convencional. O estudo tamb?m consiste de uma modelagem por meio de redes neurais artificiais dos mais diversos par?metros eletromagn?ticos das antenas quase-fractais. Os resultados apresentados demonstram a excelente capacidade das t?cnicas neurais para modelagem de antenas de microfita, e todos os algoritmos utilizados nesse trabalho na obten??o dos modelos propostos foram implementados no software comercial de simula??o Matlab 7. Com a finalidade de validar os resultados obtidos, v?rios prot?tipos de antenas foram constru?dos, medidos em um analisador de rede vetorial e simulados em software para compara??o
Kosoff, Zoe M., and Zoe M. Kosoff. "Register variation in Arabic translations of the WPAI: Balancing localization standards and Arabic language norms." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/626393.
Full textVedral, Andreas R. [Verfasser]. "Digitale Analyse, Leistungsbewertung und generative Modellierung von WPAN-Verbindungen unter industriellen Ausbreitungsbedingungen / Andreas R Vedral." Aachen : Shaker, 2007. http://d-nb.info/1163609935/34.
Full textSopko, Richard. "Univerzální mobilní komunikační platforma pracující s technologií bluetooth." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218185.
Full textAbate, Jason. "Eager and Hungry for Music: The WPA Music Project in New Orleans, 1935-1943." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/314.
Full textAlvarez, Leticia. "The Influence of the Mexican Muralists in the United States. From the New Deal to the Abstract Expressionism." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32407.
Full textMaster of Arts
Vlček, Peter. "Zabezpečení bezdrátových sítí a možné útoky na tyto sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218260.
Full textAhmed, Tanvir. "High Level Model of IEEE 802.15.3c Standard and Implementation of a Suitable FFT on ASIC." Thesis, Linköpings universitet, Elektroniksystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68697.
Full textPatel, Shalaka S. "Functional analysis of the nuclear envelope associated protein MAF1 and preliminary investigation of the coiled-coil protein TMD1." Connect to this title online, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1110300984.
Full textDocument formatted into pages. Includes bibliographical references. Abstract available online via OhioLINK's ETD Center; full text release delayed at author's request until 2006 March 9.
Karlsson, Carl. "IMPULSIVE NOISE MODELING AND COEXISTENCE STUDY OF IEEE 802.11 AND BLUETOOTH." Thesis, University of Gävle, Department of Technology and Built Environment, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-308.
Full textThis thesis describes the interference problem between IEEE 802.11 and Bluetooth. These well established communication standards are often used together simultaneously. Since both standards operate in the ISM-band at 2.45 GHz, they interfere with each other. In addition to this, interference from e.g. microwave ovens, heating processes, electric motors and cordless phones also occurs on the ISM-band. Due to this interference problem, a model has been developed in MATLAB to further investigate these interferences and the effects for the user.
The interference is modelled using the well known Class-A model for impulsive noise. The interference model is parameterized in the model and therefore the noise source(s) is described by a set of parameters derived from real measurements. Models for IEEE 802.11 legacy/b and Bluetooth are based on work published on the user community of MATHWORKS. To get a measure of performance, results from the model are presented as BER (Bit Error Rates) and PER (Packet Error Rates). When Bluetooth is used as a voice link, sound quality can also be performance evaluated directly by simply listening to a voice output file. To be able to track down a specific problem cause, measuring tools have also been included in the model to gain insight into what is causing bit/packet error.
A model describing the interference problem has been developed describing the real world usage of the standards by the use of state machines. Due to the complexity of the problem, and also for the model to be user friendly, this thesis is not composed of a thorough mathematical derivation describing BER probability for different modulation forms. The derivations for these has already been done and is therefore summarized and compared to when the model is validated. The model has been developed as a proof of concept for further work to fully support the current and coming IEEE standards for IEEE 802.11 and Bluetooth.
Rakotondrainibe, Lahatra. "Conception et réalisation d'un systme de communications sans fil très haut débit à 60 GHz pour les applications WPAN." Rennes, INSA, 2010. http://www.theses.fr/2010ISAR0026.
Full text60 GHz wireless systems that are currently under standardization within the unlicensed 57-66 GHz band are targeting multi-gigabit data rate for wireless personal area networks (WPANs) applications. Up to now, in the literature, several studies have considered the characterization of the propagation channel, potential applications, antennas, circuit design issues and several modulations at 60 GHz. However, few efforts have been dedicated to the realization of a 60 GHz wireless communications system and the characterization of its performance in realistic environments. This work, conducted under the Techim@ges research project supported by French “Media and Networks Cluster” and in association with Palmyre project, presents a full experimental implementation of a 60 GHz wireless Gigabit Ethernet communication system operating at near gigabit data rate (more precisely at 875 Mbps). As the 60 GHz radio link operates only in a single room configuration, a hybrid technology with the Radio-over-Fiber is used to ensure the communications in all the rooms of a residential environment. The realized system covers 2 GHz available bandwidth. By using the existing 60 GHz millimeter-wave blocks, this work is based on the design and realization of the baseband and intermediate frequency architectures (channel coding, modulation, synchronization, etc. ). A DBPSK single-carrier modulation is retained at the transmitter (Tx). The structure of the proposed receiver (Rx) is based on a simple differential demodulation to reduce the inter-symbol interference effect and a signal processing unit comprising byte/frame synchronization, a descrambler and an RS(255,239) decoder. An original byte/frame synchronization technique is designed to obtain a small value of the preamble false alarm and missing probabilities. The proposed system provides a good trade-off between performance and complexity. Performance measurements have been achieved in different environments and in different configurations. Measurement results show a good communication link quality and a low bit error rate (BER) for a 30 meters distance between Tx and Rx, using high gain antennas and for line-of-sight conditions
Haque, Syed E. "Efficient GTS Allocation Schemes for IEEE 802.15.4." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cs_theses/75.
Full textAlberts, Marthinus. "Analysis of the IEEE 802.15.4a ultra wideband physical layer through wireless sensor network simulations in OMNET++." Diss., University of Pretoria, 2011. http://hdl.handle.net/2263/23103.
Full textDissertation (MEng)--University of Pretoria, 2011.
Electrical, Electronic and Computer Engineering
unrestricted
Rocha, Natalia Ezagui Garcia. "Avaliação do desempenho do sistema GATELINK para PHM utilizando métodos de segurança WPA-2 e IPsec." Instituto Tecnológico de Aeronáutica, 2009. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=1277.
Full textSilva, Diego Cesar Valente e. "An?lise experimental da aplica??o da tecnologia de r?dio sobre fibra em redes IEEE 802.15.4." Pontif?cia Universidade Cat?lica de Campinas, 2009. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/505.
Full textThis work presents an experimental investigation on the implementation of wireless sensor networks (IEEE 802.15.4) over fiber optics. Such investigation was performed with the utilization of IEEE 802.15.4 transceivers, an optical fiber infrastructure inside a field-trial network, called KyaTera Network, and directly modulated lasers and photodiodes designed for usual lab applications. The analysis comprised optical and electrical signal-to-noise ratio meausermentes and packet error rate evaluation under different conditions of transmission (e.g., payload length and time between consecutive frames). Results indicate that the RF signals of the sensor network may be properly propagated through unamplified optical links of up to 100 km or for longer distances with the use of optical amplifiers.
Esse trabalho apresenta uma investiga??o experimental da implementa??o de redes de sensores (IEEE 802.15.4) sobre fibras ?pticas. Tal investiga??o foi realizada com a utiliza??o de transceptores IEEE 802.15.4, de uma infra-estrutura de fibras ?pticas localizada dentro uma rede experimental, chamada Rede KyaTera, e de lasers com modula??o direta e foto-diodos projetados para opera??es usuais em laborat?rios. A an?lise compreendeu medidas a raz?o sinal-ru?do ?ptica e el?trica e a avalia??o da taxa de erro de quadros sob diferentes condi??es de transmiss?o (p. ex., tamanho de payload e intervalo de tempo entre quadros sucessivos). Os resultados indicam que os sinais de RF da rede de sensores podem ser propagados adequadamente, sem amplifica??o ?pticapor, em enlaces de at? 100 km ou por dist?ncias ainda maiores, com a utiliza??o de amplificadores ?pticos.
Robert, Pablo Maximiliano. "Reduction in Coexistent WLAN Interference Through Statistical Traffic Management." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/27167.
Full textPh. D.
Purandare, Darshan. "ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2998.
Full textM.S.
School of Computer Science
Engineering and Computer Science
Computer Science
Sorum, William A. ""Much Depends on Local Customs:"The WPA's New Deal for New Orleans, 1935-1940." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1181.
Full textOrrevad, Anders. "M2M Traffic Characteristics : When machines participate in communication." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91482.
Full textMaskin-till-maskin, maskin-till-man, eller man-till-maskin (M2M) kommunikation förväntas växa mycket snabbt under de närmaste åren med förväntade 50 miljarder enheter anslutna till en bredbandsuppkoppling år 2020 [35]. För att kunna planera och dimensionera för den förväntade (ökningen) i datatrafik är det viktigt att ha en modell för den trafik som kommer att flöda genom nätverket. Ett begrepp det ofta talas om i samband med M2M-kommunikation är " Internet of things ", där miljarder "smarta" objekt är anslutna till Internet och enkelt kan delas och användas på nytt sätt och av många användare. En undergrupp inom M2M-kommunikation är sensor nätverk som installeras i hushåll, för att skapa automatiserade hem där hemelektroniken kan prata med andra apparater och program som körs på datorer anslutna till Internet. Sådana sensornätverk utvidgar användningen av hushållsapparater till helt nya och spännande applikationer, samtidigt som det potentiellt göra bostäder mer energisnåla genom smartare förvaltning och drift av dessa apparater. Detta examensarbete görs på uppdrag av Ericsson i Kista, Sverige under sommaren och hösten 2009. Akademisk rådgivare är GQ Maguire Jr från Kungliga Tekniska Högskolan (KTH) och industriell rådgivare är Per Ljungberg på Ericsson. Examensarbetet har som industriellt fokus att tillverka modeller och prototyper för att modellera trafiken i Ericssons nätverk. Examensarbetets akademiska värde är genom att erbjuda lättgörliga modeller för M2M trafik som har en grund i verkligheten, snarare än lösningar på jakt efter ett problem.
Rabbani, Muhammad Saqib. "Microstrip antenna design with improved fabrication tolerance for remote vital signs monitoring and WLAN/WPAN applications at mm-wave and THz frequencies." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8091/.
Full textAllee, Jessica. "New Deal Art Now: Reframing the Artifacts of Diversity." OpenSIUC, 2014. https://opensiuc.lib.siu.edu/theses/1536.
Full textHaque, Md Ansarul, and Md Delwar Hossain. "Technology Survey of Wireless Communication for In-vehicle Applications." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23389.
Full text