Journal articles on the topic 'WIRELESS LAN TECHNOLOGY'

To see the other types of publications on this topic, follow the link: WIRELESS LAN TECHNOLOGY.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'WIRELESS LAN TECHNOLOGY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Nakano, Kazumasa. "Wireless LAN Technology for Ship." Journal of The Japan Institute of Marine Engineering 49, no. 5 (2014): 607–10. http://dx.doi.org/10.5988/jime.49.607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Banerji, Sourangsu, and Rahul Singha Chowdhury. "On IEEE 802.11: Wireless Lan Technology." International Journal of Mobile Network Communications & Telematics 3, no. 4 (August 31, 2013): 45–64. http://dx.doi.org/10.5121/ijmnct.2013.3405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Z., S. Song, J. Chen, H. Wang, J. Huang, and X. Gao. "A wireless LAN-based indoor positioning technology." IBM Journal of Research and Development 48, no. 5.6 (September 2004): 617–26. http://dx.doi.org/10.1147/rd.485.0617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

She, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.

Full text
Abstract:
Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used to improve security status of endpoint. Applying Trusted Computing technology can solve these challenges and enhance WLAN security.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jun Lei, Hui Min Zhang, Cui Min Lian, and Rong Li. "Applications of the Wireless LAN Technology in the Nursing Work." Advanced Engineering Forum 4 (June 2012): 19–21. http://dx.doi.org/10.4028/www.scientific.net/aef.4.19.

Full text
Abstract:
With the rapid development of computer network technology, wireless networks have developed to wireless wide area network from a single wireless personal area network. Expansion of coverage was spread from a few meters to a global range and transmission speed was also doubled. The wireless network is gradually used into complicated module network environment, especially in the field of medical treatment, depending on the flexibility and the sound extendibility of its module network. This article is to introduce the wireless LAN technique and its character, and also to express its scientific use in the care.
APA, Harvard, Vancouver, ISO, and other styles
6

Zeng, Li Li. "Wireless LAN Security Vulnerabilities and Improvement Measures." Applied Mechanics and Materials 543-547 (March 2014): 3335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3335.

Full text
Abstract:
This paper mainly analyzed the security of TKIP protocol and VPN technology ,the wireless LAN 802.11 and 802.1x/EXP security vulnerabilities: defects of SSID and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WEP Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The author put forward improvement authentication and encryption method as improving wireless LAN security measures.
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Jiujun, Liufei Hu, Junjun Liu, Qingyang Zhang, and Chendan Yan. "A New Mechanism for Network Monitoring and Shielding in Wireless LAN." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/620926.

Full text
Abstract:
Wireless LAN (WLAN) technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.
APA, Harvard, Vancouver, ISO, and other styles
8

Ghadage, Shivani, Swapnali Joshi, and Shweta Thorat. "Wi-Fi Technology." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (December 31, 2022): 1068–69. http://dx.doi.org/10.22214/ijraset.2022.48112.

Full text
Abstract:
Abstract: Technology is making rapid progress and is making many things easier. As the innovative thinking of persons is increasing day-by-day, new methods for wireless networking has been evolved of which our Wi-Fi, (Wireless Fidelity) is a trademark that belongs to the Wi-Fi Alliance. It is name commonly used for the standard of wireless (radio) connection that integrates several protocols and is based on a family of IEEE 802.11 standards (Institute of Electrical and Electronic Engineers is an international organization dedicated to the development of standards in electronic technology). The most famous and the most common today is IEEE 802.11g protocol, which determines the operation of wireless networks. Install Wireless LAN was recommended where the deployment of cable system was Wi-Fi, an acronym for Wireless-Fidelity which is the wireless way to handle networking. The main aim of this paper is wireless networking achieved by Wi-Fi. This paper introduces Wi-Fi technology and states the history of this technology in brief. We then deal with the different ways of wireless networking, connecting wi-fi and with wi-fi security. This paper concludes with the pros and cons of this technology and it’s future.
APA, Harvard, Vancouver, ISO, and other styles
9

TOKUNAGA, Masashi, Ryoma NISHIMURA, and Syunji NAGAMI. "Wireless LAN of Newest Technology in High-Speed Mobile Object." Journal of The Institute of Electrical Engineers of Japan 127, no. 8 (2007): 545–48. http://dx.doi.org/10.1541/ieejjournal.127.545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiong, Yongping, Ruogu Zhou, Minming Li, Guoliang Xing, Limin Sun, and Jian Ma. "ZiFi: Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery." IEEE Transactions on Mobile Computing 13, no. 11 (November 2014): 2675–88. http://dx.doi.org/10.1109/tmc.2014.2309610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Full text
Abstract:
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
APA, Harvard, Vancouver, ISO, and other styles
12

Antero, Ganner, Abdul Rasyid, and Martono Dwi Atmadja. "Analisis Kinerja Wireless Access Point Menggunakan Wifi Monitoring Tools Berbasis Raspberry Pi 3." Jurnal Jartel Jurnal Jaringan Telekomunikasi 11, no. 4 (December 30, 2021): 167–74. http://dx.doi.org/10.33795/jartel.v11i4.245.

Full text
Abstract:
Komputer mini sekarang cukup maju hingga dapat dimanfaatkan dalam berbagai bidang. Salah satu komputer mini yang banyak digunakan adalah Raspberry Pi 3. Raspberry Pi 3 adalah salah satu komputer mini yang memiliki fitur berupa wireless LAN. Fitur wireless LAN pada komputer mini dapat dimanfaatkan sebagai Wireless Access Point. Sehingga Raspberry Pi 3 dapat menjadi alternatif Wireless Access Point. Namun komputer mini mempunyai kemampuan yang berbeda dengan Wireless Access Point pada umumnya karena mempunyai spesifikasi yang berbeda. Tujuan dari penelitian ini adalah untuk mengetahui kinerja dari Wireless Access Point yang berbasis Raspberry Pi 3. Raspberry Pi 3 dihubungkan dengan laptop yang sudah terhubung dengan internet melalui kabel LAN dengan tujuan agar Raspberry Pi 3 dapat terhubung ke internet. Raspberry Pi 3 dikonfigurasikan sebagai Wireless Access Point (WAP) dan diprogram untuk pengambilan data dan monitoring yang berupa trafik dan informasi user yang ditampilkan dalam tampilan web. Pada penelitian ini telah dilakukan pengujian Raspberry Pi 3 sebagai Wireless Access Point. Kemampuan Raspberry Pi 3 sebagai Wireless Access Point sangat dipengaruhi oleh trafik yang dilakukan oleh user. Menurut hasil pengujian Raspberry Pi 3 sebagai Wireless Access Point memiliki batas maksimum user sejumlah 13 dengan beban trafik yang tinggi, 17 user dengan beban yang sedang dan 27 dengan beban yang rendah. Hal ini menunjukkan bahwa Raspberry Pi 3 layak digunakan sebagai Wireless Access point dalam skala kecil.
APA, Harvard, Vancouver, ISO, and other styles
13

Asep Supriadi, Hendra Supendar, and Sulistianto Sutrisno Wanda. "MANAJEMEN KEBIJAKAN JARINGAN NIRKABEL MENGGUNAKAN CLOUDPATH ENROLLMENT SYSTEM DENGAN METODE RADIUS." Jurnal Teknik Informatika dan Teknologi Informasi 2, no. 1 (August 17, 2022): 17–33. http://dx.doi.org/10.55606/jutiti.v2i1.338.

Full text
Abstract:
ABSTRAK Many ways are used to make communication easier, One of the most notable changes to computer network communication technology is the use of wireless technology. The technology applied to this computer network is commonly called WLAN (Wireless LAN). WLAN is a local network of wireless areas that uses radio waves as a transmission medium. The conveniences contained in this technology are the triggers for choosing the use of technology in computer networks. Of all the conveniences offered by wireless, there is a weakness in the application of this technology, namely the security side, which still has many loopholes to be attacked by other parties. Many unauthorized clients can access hotspots, if this happens, it will directly or indirectly harm the ISP (Internet Service Provider). By implementing the Ruckus Cloudpath Application configuration and the use of RADIUS features on the user side. Based on the results of research, the best security system at this time uses the WPA RADIUS (Wireless Protection Autentication Remote Authentication Dial in User Services) method. Keywords: Wireless, Cloudpath, RADIUS. Banyak cara yang digunakan untuk membuat komunikasi semakin mudah, Salah satu perubahan paling menonjol pada teknologi komunikasi jaringan komputer adalah penggunaan teknologi wireless. Teknologi yang diterapkan pada jaringan komputer ini biasa disebut WLAN (Wireless LAN). WLAN adalah suatu jaringan lokal area tanpa kabel yang menggunakan gelombang radio sebagai media tranmisinya. Kemudahan-kemudahan yang terdapat pada teknologi ini yang menjadi pemicu pemilihan penggunaan teknologi pada jaringan komputer. Dari semua kemudahan-kemudahan yang ditawarkan wireless ini terdapat suatu kelemahan dalam penerapan teknologi ini yaitu sisi keamanan yang masih banyak terdapat celah untuk diserang oleh pihak-pihak lain. Banyak client yang tidak sah dapat mengakses hotspot, jika sampai hal ini terjadi maka secara langsung atau tidak langsung akan merugikan pihak ISP (Internet Servis Provider). Dengan menerapkan konfigurasi Aplikasi Ruckus Cloudpath dan penggunaan fitur RADIUS di sisi pengguna. Berdasarkan hasil penelitian sistem keamanan terbaik pada saat ini menggunakan metode WPA RADIUS (Wireless Protection Autentication Remote Authentication Dial in User Services). Kata Kunci: Wireless, Cloudpath, RADIUS.
APA, Harvard, Vancouver, ISO, and other styles
14

MIWA, Takashi, Nobukazu WAKABAYASHI, and Yoshiji YANO. "Constructing shipboard LAN system using wireless LAN technology and its Application to the ship monitoring system." Journal of Japan Institute of Navigation 114 (2006): 243–50. http://dx.doi.org/10.9749/jin.114.243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Takatori, Yasushi, Yusuke Asai, and Yasuhiko Inoue. "7. MIMO Technologies in Wireless LAN Systems." Journal of the Institute of Image Information and Television Engineers 70, no. 1 (2016): 35–40. http://dx.doi.org/10.3169/itej.70.35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Kubota, Shuji. "5. Forward Error Correction of Wireless LAN." Journal of The Institute of Image Information and Television Engineers 70, no. 9 (2016): 764–69. http://dx.doi.org/10.3169/itej.70.764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Woo, Jong-Jung, and Su-Goog Shon. "Development of the Embedded Wireless LAN Technology for Power Utility Equipments." Journal of the Korean Institute of Illuminating and Electrical Installation Engineers 20, no. 10 (December 31, 2006): 126–34. http://dx.doi.org/10.5207/jieie.2006.20.10.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Emilselvan, G. s. r., N. Gayathri, S. Rakesh Kumar, Ankush Rai, and Jagadeesh Kannan R. "ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 441. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19987.

Full text
Abstract:
Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.
APA, Harvard, Vancouver, ISO, and other styles
19

Gao, Xiao Yan. "Design of the Wireless Communications System in the Nuclear Power Plants." Applied Mechanics and Materials 494-495 (February 2014): 1902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1902.

Full text
Abstract:
With the development of wireless network technology, wireless communication is widely used in entertainment, business, factory and other fields. But, for those nuclear power plants which are currently in service, wireless technology did not get fully used, some even in unused condition. Actually, wireless communication system can be used to provide wireless connection between computer and mobile/portable devices, and provide access to LAN system; it also can be used to transmit video and data for cameras and sensors; it can realize wireless expansion of MAIN PABX system, so to meet all kinds of Wireless communication requirements in Nuclear Power Station.
APA, Harvard, Vancouver, ISO, and other styles
20

Jostschulte, K., R. Kays, and W. Endemann. "Enhancement of wireless LAN for multimedia home networking." IEEE Transactions on Consumer Electronics 51, no. 1 (February 2005): 80–86. http://dx.doi.org/10.1109/tce.2005.1405703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Zhi Min, De Han Luo, Dan Jun Fan, and Chao Wang. "Design and Realization of Wireless LAN in Smart Home System Based on 433MHZ Communication." Applied Mechanics and Materials 336-338 (July 2013): 1645–49. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1645.

Full text
Abstract:
Nowadays, wireless network technology in smart home is rapid gaining popularity duo to its flexible integration into everyday life. The paper introduces a method that adopts 433MHZ communication to establish the wireless network in smart home system based on Si4421 wireless modules. The paper designed the overall idea of how to establish the wireless network, it mainly talk about the wireless module, including both software and hardware. The difficulty lies in the realization of the custom wireless communication protocol. The Si4421 wireless module was tested in data communication and control in smart home system which can work efficiently and reliably, it proved that the wireless module is perfectly suitable for the wireless network construction in smart home with small size package, low consumption, low cost, and strong ability to leap obstacles.
APA, Harvard, Vancouver, ISO, and other styles
22

Hu, Shi Yang, Sheng Cheng Zhang, and De Ze Qin. "The Design and Application of Wireless Network Based on Digital Campus." Advanced Materials Research 1078 (December 2014): 337–40. http://dx.doi.org/10.4028/www.scientific.net/amr.1078.337.

Full text
Abstract:
With the rapid development of society, universities also develop its digital, intelligent business, which gradually increases the network data transmission needs. Wireless networks are an important part of the campus network, it is very important to build the campus wireless network as a supplement to a campus network. This design introduces a wireless network technology, and uses He Zhou College West Campus as a platform to design the campus wireless LAN-building program. The wired network and wireless network combine to provide better conditions for the campus information technology.
APA, Harvard, Vancouver, ISO, and other styles
23

Sarmah, S., S. K. Sarma, and M. Rahman. "An Intelligent Method for Bandwidth Utilization in IEEE 802.11e Wireless LAN." International Journal of Recent Technology and Engineering 9, no. 5 (January 30, 2021): 172–77. http://dx.doi.org/10.35940/ijrte.e5230.019521.

Full text
Abstract:
IEEE 802.11 Wireless LAN, popularly known as WiFi, has become the admired source of internet connectivity for most of the offices as well as organizations. Due to the rapid growth of multimedia data and VoIP and also to provide better quality of service (QoS), bandwidth and management of bandwidth have become important factors in 802.11 wireless LAN. In 802.11 wireless LAN, Enhanced Distributed Coordination Access (EDCA) mechanism provides QoS with service differentiation by setting different priority to different traffic types. Some of the available methods provide priority based on user category also. In this paper we have proposed an intelligent bandwidth management technique based on the user priority value, traffic priority value and the bandwidth requirement value. By combining these three values, a new metric called request weight value is calculated. Based on this request weight value, dynamically bandwidth is allocated to the users. From the simulation results, we have seen that the proposed method performs well in proper utilization of bandwidth among the available users.
APA, Harvard, Vancouver, ISO, and other styles
24

Jae-Young Pyun, Yoon Kim, Kyung Hun Jang, Jong Ae Park, and Sung-Jea Ko. "Wireless measurement based resource allocation for QoS provisioning over IEEE 802.11 wireless LAN." IEEE Transactions on Consumer Electronics 49, no. 3 (August 2003): 614–20. http://dx.doi.org/10.1109/tce.2003.1233784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Il-Gu, Kyungmin Go, and Jung Hoon Lee. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices." Sensors 20, no. 7 (April 5, 2020): 2043. http://dx.doi.org/10.3390/s20072043.

Full text
Abstract:
Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
26

Cavalieri, S., and D. Panno. "A novel solution to interconnect FieldBus systems using IEEE wireless LAN technology." Computer Standards & Interfaces 20, no. 1 (November 1998): 9–23. http://dx.doi.org/10.1016/s0920-5489(98)00013-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Tarmizi, Achmad Rian, Ahmat Adil, and Lilik Widyawati. "Optimization Of The Use Of Wireless Lan Devices To Minimize Operational Costs." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 19, no. 2 (May 30, 2020): 195–206. http://dx.doi.org/10.30812/matrik.v19i2.665.

Full text
Abstract:
WLAN technology has been widely developed for the needs of internet access in people's lives. Several generations of WLAN technology include IEEE 802.11b, IEEE 802.11a, IEEE 802.11g and IEEE 802.11n. At the STAHN Rectorate Building, Gde Pudja Mataram, WLAN technology in its application requires financial consideration because excessive use of Internet Service Provider services results in a waste of operational costs. The application of WLAN is still not optimal, because there are not too many users, but the operational costs of implementing the local wireless network are very large, due to less optimal application of network infrastructure. The recommended WLAN technology is IEEE 802.11n, while the technology is the latest technology that has better quality than the previous generation technology. The research methodology uses the Network Development Life Cycle (NDLC). Of the 6 stages available, only 3 stages are used, namely Analysis, Design and Simulation of Prototyping. The results obtained from this study are models that design a WLAN that suits your needs, and complements the entire Building area. Optimization has succeeded in reducing the need for ISP and client services while still being able to enjoy services as needed and cost optimization can be reduced by around 28%.
APA, Harvard, Vancouver, ISO, and other styles
28

Ma, Jin Jin, Guang Jin, Xian Liang Jiang, Lu Juan Huang, and Xian Mang He. "On the Wireless Network Curriculum Teaching." Applied Mechanics and Materials 378 (August 2013): 514–19. http://dx.doi.org/10.4028/www.scientific.net/amm.378.514.

Full text
Abstract:
Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT major, the computer network curriculum mainly focuses on the wired networks rather than the wireless networks and is hard to meet the needs of IT industry. In this paper, we firstly survey the current teaching of wireless network techniques and then discuss the necessity of the wireless network curriculums. By improving teaching contents and methods, we put forward a novel wireless network teaching mode using simulation tools.
APA, Harvard, Vancouver, ISO, and other styles
29

Jamalipour, A., and S. Valaee. "Toward seamless internetworking of wireless lan and cellular networks - Guest Editorial." IEEE Wireless Communications 12, no. 3 (June 2005): 6–7. http://dx.doi.org/10.1109/mwc.2005.1452849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Cao, Xu Hui, Cai Wu Lu, and Yu Ji Li. "WI-FI in Mine Ventilation Monitoring System." Advanced Materials Research 591-593 (November 2012): 1835–38. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1835.

Full text
Abstract:
WI-FI is currently a popular wireless LAN technology, with access to high speed, large coverage area and so on. WI-FI has its flexibility and mobility, more and more attention, showing great prospects. This article describes the characteristics and advantages of WI-FI technology, combined with the actual situation of a WI-FI based wireless sensor technology and monitoring system for the implementation of the mine ventilation plan, and the program specific application in the monitoring system has been described, the program has proved flexible, simple wiring, has certain application value.
APA, Harvard, Vancouver, ISO, and other styles
31

Djuraev, Sirojiddin, and Seung Yeob Nam. "Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness." Electronics 9, no. 11 (October 22, 2020): 1749. http://dx.doi.org/10.3390/electronics9111749.

Full text
Abstract:
Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where attackers send malicious messages or signal on a legitimate channel by causing intentional interference in the network. In order to avoid jamming attacks, various jamming defense schemes have been proposed. One of the popular methods is a channel-hopping scheme. However, the main challenge of this method is generating a common channel number between the users and the access point without leaking that information to the jammer. We propose a new channel-hopping scheme where the access point shares a separate key with each user to isolate the damage on the network when a key has been compromised, while maintaining high throughput and fairness. We evaluate the proposed scheme through experiment on a test bed.
APA, Harvard, Vancouver, ISO, and other styles
32

P, Senthilkumar, and Baskar M. "A study on mobile ad-hock networks (manets)." Journal of Management and Science 1, no. 1 (June 30, 2011): 14–20. http://dx.doi.org/10.26524/jms.2011.3.

Full text
Abstract:
As we know that wireless technology becomes very famous among all the aspects of different technologies of computer networking of present era, the Wireless networks really provide the convenient and easy approach to communications between different areas. Wi-Fi is commonly called as wireless LAN, it is one of those networks in which high frequency radio waves are required for transmission of data from one place to another. Wi-Fi operates on several hundred feet between two places of data transmission. This technology only works on high frequency radio signals. Nowadays this technology is used as office or home network and in many electronic devices. Wireless LAN or Wi-Fi is divided into three main parts on which its whole working depends and all of its applicationsdepend on these parts such as infrastructure mode and ad hoc mode of networking. However, the important type that plays a vital role almost in application is the Ad Hoc mode of networking.This type of networking is also commonly called as peer-to-peer networking or P2P networking. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. There is still ongoing research on mobile ad hoc networks and the research may leadto even better protocols and will probably face new challenges. The current goal is to find an optimal balance between scalable routing and media access control, security, and service management.
APA, Harvard, Vancouver, ISO, and other styles
33

Sun-Wook Kim and Kyun Hyon Tchah. "Performance analysis of adaptive equalizer design for OFDM wireless LAN." IEEE Transactions on Consumer Electronics 50, no. 2 (May 2004): 512–16. http://dx.doi.org/10.1109/tce.2004.1309416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Cunningham, G., P. Perry, J. Murphy, and L. Murphy. "Seamless Handover of IPTV Streams in a Wireless LAN Network." IEEE Transactions on Broadcasting 55, no. 4 (December 2009): 796–801. http://dx.doi.org/10.1109/tbc.2009.2030466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Chunmei, Bin Li, and Guohong Shi. "Design of Electronic Remote Control System Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (May 14, 2017): 146. http://dx.doi.org/10.3991/ijoe.v13i05.7057.

Full text
Abstract:
<p class="0abstract">A wireless remote sensing system based on wireless sensor network solution is proposed, to achieve the remote control of home appliances. The remote control system uses STM32F103 chip as the main controller of the smart home system, and applies the CC1110 radio frequency module as the communication node of the home wireless sensor network. Through the Simplici TI network protocol, these nodes together are put forward to form a small home LAN. Then, combining with GPRS wireless communication technology and Web Internet technology, these nodes to the remote server are collected. The results showed that through the user's mobile terminal access, it can form a wireless remote monitoring system. The conclusion is drawn that an intelligent home remote monitoring system based on wireless sensor network is feasible and it has good performances.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Abdul Malik, Mohd Mirza, Mohd Nizam Osman, and Mushahadah Maghribi. "Monitoring and Evaluating Open Wireless LAN using Hybrid IDS." Journal of Computing Research and Innovation 4, no. 2 (November 14, 2019): 60–67. http://dx.doi.org/10.24191/jcrinn.v4i2.118.

Full text
Abstract:
In this ever-growing wireless technology era, the number of Open Wireless Local Area Network (WLAN) are on the rise. From cafes to shopping areas, most of them offer users with a free-to-use WLAN which popularly known as Open Wi-Fi or Wi-Fi Hotspots. Although it is a convenient for them to access the Internet at these places, later they know it also makes them a vulnerable target for attackers that might be lurking in the same network they are connected. Therefore, a Hybrid IDS that combines both SNORT, a network-based IDS (NIDS) and OSSEC, a host-based IDS (HIDS) was developed to curb the problem. NIDS was used to monitor network traffics while HIDS monitor user’s system for any suspicious activities. Then, a system that can control and manage both IDS in the much easier and simpler way was developed using Python programming language. The system then can generate alerts with the help of both IDS to notify users for any suspicious activities that might occur in the network or user’s system. Several attacks were launched from the attacker’s laptop to test whether Hybrid IDS can generate alerts to notify the victim. As a result, the system breeze through the testing phase by showing necessary output. All the results were taken and then compared with other scenarios to determine whether they can give the same results as Hybrid IDS. From the comparison results, it can be said that Hybrid IDS can give the extra protection layer towards Open Wi-Fi users. Therefore, the Hybrid IDS was proven to provide vast tracking detection for suspicious activity in the network environments by monitor and alert the users about malicious activities.
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Qing Fu, Jian Wu Yang, and Zhi Cheng Chen. "The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01." Advanced Materials Research 271-273 (July 2011): 991–94. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.991.

Full text
Abstract:
With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
38

Haryanto, Dedi. "PERANCANGAN JARINGAN WIRELESS ACCESS POINT UNTUK MENJADIKAN BISNIS UMKM NADINASALIM MENGGUNAKAN PACKET TRACER DENGAN METODE PENGEMBANGAN Network Development Life Cycle (NDLC)." Jusikom : Jurnal Sistem Komputer Musirawas 7, no. 1 (June 1, 2022): 53–60. http://dx.doi.org/10.32767/jusikom.v7i1.1594.

Full text
Abstract:
Penggunaan pada suatu jaringan komputer selama beberapa dekade.yang telah di gunakan untuk saling berhubungan dalam proses bisnis di prusahaan, perguruan tinggi, anatr kota, ataupun antar suatu.wilayah.-Pada awalnya,jaringan komputer mengunakan kabel untuk-saling;berhubungan, namun.perlahan hal ini berubah menuju ke arah pemakaianpada jaringan nirkabel.,Pada Applikasi jaringan nirkabel ini dapat memberikan dampak dalam proses perubahan yang cukup signifikan yang dapat memungkinkan untuk orang-orang yang dapat .bisa memperluas dalam,ruang lingkup kerja mereka yang dikarenakan tidak berkaitan, pada kabel. M.Setiawan hidayat (2009). menjelaskan bahwa banyak benefit yang nyata dari beberapa .penggunaan pada jaringan wireless, terutama pada berkaitan dengan masalah yang terdapat pada suatu jaringan kabel. Salah satu benefit dari penggunaan jaringan wireless adalah relatif-tidak adanya batasan jarak. Biasanya.kabel harus dipasang mengikuti bentuk dinding, melintasi-lantai-dan-lain-lain.-Metode.penelitian.ini-menggunakan metode Network Development Life Cycle (NDCL),untuk dapat merancang-suatu-jaringan dengan menggunakan konfigurasi access point.yang dapat memudahkan untuk mengirimkan data dan mempercepat suatu koneksi serta access.point tersebut dapat menghubungkan suatu jaringan lokal dengan jaringan nirkabel. Jaringan wireless meniadakan hal ini karena bersipat line of sight. Wireless Local Area Network (WLAN) berfungsi untuk menjangkau wilayah LAN yang sulit dicapai dengan kabel dan juga untuk menjangkau pengguna bergerak (mobile user) serta dpat mengeliminasi atau dapat memilih penggunaan kabel yang dapat cukup mengganggu dalam kerumitan instalisasi dalam menghubungkan lebih dari satu komputer maupun pengguna bergerak(mobile user).
APA, Harvard, Vancouver, ISO, and other styles
39

Abbasov, Е. М. "Indicators of wireless technologies for monitoring the quality and management." Informacionno-technologicheskij vestnik 11, no. 1 (March 30, 2017): 14–24. http://dx.doi.org/10.21499/2409-1650-2017-1-14-24.

Full text
Abstract:
The problems of integration of the various wireless technologies, for-consists in the provision of required transmission speed and the transmission of information over a considerable distance at low power sensor nodes transmitters wireless Internet-water network for remote monitoring. Analyzed the integration of wireless LAN standard IEEE 802.11n/g and Bluetooth. Determined Graphic analytical dependence-dence, the defining characteristics of the data rate for wireless IEEE 802.11n / g networks. It analyzes the main shortcomings of BSS associated with ef cient use of batteries; the basic Metody reduce energy consumption for WSN based on the ZigBee technology, based on the planning schemes of awakening and data collection schemes. The possibilities MeshLogic technology solutions for the monitoring and control tasks that are critical to BPE-autonomous work Meni sensors.
APA, Harvard, Vancouver, ISO, and other styles
40

Huang, Li Hua, Xi En Ye, and Xin Jun Shi. "The Design and Application of WiFi-Smart Socket in Smart Home." Advanced Materials Research 902 (February 2014): 274–79. http://dx.doi.org/10.4028/www.scientific.net/amr.902.274.

Full text
Abstract:
Smart home system mainly consists of home networking, home wireless LAN and the external network components. It will achieve the intelligentize and informatization of the home furnishing. Smart socket is one of which belongs to the smart home terminal devices. This article is to talk about smart socket. The core chips of this system are Texas Instruments CC3000MOD and MSP430FR5739MCU. Using WiFi wireless communications technology control and process signals coming from the side of the handheld PDA. Controller side can support two software platforms IAR or CCS. This design uses IAR workbench. PDA client software using the Android operating system is used to receive and process analog signals from controller side. In this paper, WiFi wireless transmission technology as the basis, based on IEEE802.11b/g wireless protocol, It achieves a WiFi wireless communication system for remote or local client and terminal equipment, enabling the intelligent control of the home furnishing.
APA, Harvard, Vancouver, ISO, and other styles
41

Farnham, Tim, Mahesh Sooriyabandara, and Costas Efthymiou. "Enhancing multimedia streaming over existing wireless LAN technology using the Unified Link Layer API." International Journal of Network Management 17, no. 5 (2007): 331–46. http://dx.doi.org/10.1002/nem.667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Asaf, Khizra, Bilal Khan, and Ga-Young Kim. "Wireless Lan Performance Enhancement Using Double Deep Q-Networks." Applied Sciences 12, no. 9 (April 20, 2022): 4145. http://dx.doi.org/10.3390/app12094145.

Full text
Abstract:
Due to the exponential growth in the use of Wi-Fi networks, it is necessary to study its usage pattern in dense environments for which the legacy IEEE 802.11 MAC (Medium Access Control) protocol was not specially designed. Although 802.11ax aims to improve Wi-Fi performance in dense scenarios due to modifications in the physical layer (PHY), however, MAC layer operations remain unchanged, and are not capable enough to provide stable performance in dense scenarios. Potential applications of Deep Learning (DL) to Media Access Control (MAC) layer of WLAN has now been recognized due to their unique features. Deep Reinforcement Learning (DRL) is a technique focused on behavioral sensitivity and control philosophy. In this paper, we have proposed an algorithm for setting optimal contention window (CW) under different network conditions called DRL-based Contention Window Optimization (DCWO). The proposed algorithm operates in three steps. In the initial step, Wi-Fi is being controlled by the 802.11 standards. In the second step, the agent makes the decisions concerning the value of CW after the TRAIN procedure for the proposed algorithm. The final phase begins after the training, defined by a time duration specified by the user. Now, the agent is fully trained, and no updates will be no longer received. Now the CW is updated via the OPTIMIZE process of DCWO. We have selected total network throughput, instantaneous network throughput, fairness index, and cumulative reward, and compared our proposed scheme DCWO with the Centralized Contention window Optimization with DRL (CCOD). Simulation results show that DCWO with Double Deep Q-Networks (DDQN) performs better than CCOD with (i) Deep Deterministic Policy Gradient (DDPG) and (ii) Deep Q-Network (DQN). More specifically, DCWO with DDQN gives on average 28% and 23% higher network throughput than CCOD in static and dynamic scenarios. Whereas in terms of instantaneous network throughput DCWO gives around 10% better results than the CCOD. DCWO achieves almost near to optimal fairness in static scenarios and better than DQN and DDPG with CCOD in dynamic scenarios. Similarly, while the cumulative reward achieved by DCWO is almost the same with CCOD with DDPG, the uptrend of DCWO is still encouraging.
APA, Harvard, Vancouver, ISO, and other styles
43

B., Manjula, Devendra Kumar, and Rani Medhashree. "Implementation of Virtual WLAN Using Transformerless Power Convertors." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 38–40. http://dx.doi.org/10.35121/ijapie201804227.

Full text
Abstract:
Today, Wireless communication is so vital in the field of science and technology. Research regarding these capabilities suggests that Wireless LANs. Virtualization of the wireless network interface, which means using a single wireless network interface to connect to more than one network simultaneously. This paper provides an introductory study for the Creation of a virtual WLAN controller that will implement many of the configuration functions currently running on several Wireless Access point to a centralized box. This will allow seamless management of large numbers of such access points running different hardware to be seamlessly managed. The firmware running on the access point will an OpenWRT open source solution that will use CAPWAP protocol to communicate with the virtual LAN controller.
APA, Harvard, Vancouver, ISO, and other styles
44

Ali, Adnan Hussein, Alaa Desher Farhood, and Maham Kamil Naji. "Analysis of a framework implementation of the transceiver performances for integrating optical technologies and wireless LAN based on OFDM-RoF." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 4252. http://dx.doi.org/10.11591/ijece.v10i4.pp4252-4260.

Full text
Abstract:
The greatest advantages of optical fibers are the possibility of extending data rate transmission and propagation distances. Being a multi-carrier technique, the orthogonal frequency division multiplexing (OFDM) can be applicable in hybrid optical-wireless systems design owing to its best spectral efficiency for the interferences of radio frequency (RF) and minor multi-path distortion. An optical OFDM-RoF-based wireless local area network (W-LAN) system has been studied and evaluated in this work. The outline for integrating an optical technology and wireless in a single system was provided with the existence of OFDM-RoF technology and the microstrip patch antenna; these were applied in the Optisystem communication tool. The design of the proposed OFDM-RoF system is aimed at supporting mm-wave services and multi-standard operations. The proposed system can operate on different RF bands using different modulation schemes like 4,16 and 64QAM, that may be associated to OFDM and multidata rates up to 5 Gbps. The results demonstrate the robustness of the integrated optical wireless link in propagating OFDM-RoF-based WLAN signals across optical fibers.
APA, Harvard, Vancouver, ISO, and other styles
45

Kennedy, Janero, and Soleh Nur Rohman. "PERANCANGAN JARINGAN WIRELESS LAN DENGAN MENGGUNAKAN ROUTER OS MIKROTIK PADA SEKOLAH DASAR NEGERI PAHONJEAN 01." Jurnal Teknologi dan Bisnis 1, no. 1 (December 20, 2019): 103–13. http://dx.doi.org/10.37087/jtb.v1i1.59.

Full text
Abstract:
The background is a problem that occurs in al-Ittihad elementary school which causes the author to take the title of this thesis. . Around the Al-Ittihad Elementary School, the network signal from ISP providers, both GSM and CDMA, is not very good so that the data access received is not optimal. This is based on the author's own experience using GSM modems, surveys and interviews with teachers and school staff at Al-Ittihad Elementary School. Also faced with the fact that the high tariff for unlimited data access from the service provider PT. Telkom (speedy) made the author look for a solution, is there another way that is cheaper and simpler to be able to use the internet easily in the scope of this al-Ittihad elementary school comfortably, safely without having to worry about banned sites. The purpose and objective of the research is to first recognize and understand further computer network technology, especially wireless/wireless (wireless) networks. Both members make it easy for users to access the internet. Third, knowing the technique of making / building an infrastructure and implementation. Fourth, get to know information technology in the al-Ittihad elementary school environment. The research method is the method used by the author in the preparation of this thesis. The author uses methods and techniques to compile and present appropriate and accurate information. Therefore, appropriate methods and techniques are needed to obtain valid and accountable data. The method used by the author is as follows, the first research location. Second Collecting data and third Designing. Implementation is discussing how to install and configure the devices used in designing the WLAN network at the Al-Ittihad elementary school in Cilacap with Mikrotik. The output or results achieved in the design of this WLAN (Wireless Local Area Network) is to provide convenience for teachers, students and school visitors in accessing the internet, accessing the internet is not only in the school room but can also be accessed around the school environment via a wireless network. and does not require a data cable so that it is more efficient and effective.
APA, Harvard, Vancouver, ISO, and other styles
46

Yang, Hui Ying, Xiao Hua Sun, Yan Zhao, and Fu Shun Wang. "The Medical Infusion Alarm System Based on the Smart Phone Platform." Advanced Materials Research 765-767 (September 2013): 1146–50. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1146.

Full text
Abstract:
Using the Windows Phone 7.5 smart phones as platform and the Silverlight technology designed and developed a set of complete infusion alarm system. With its own wireless Wi-Fi capabilities, through the hospital's wireless LAN access patient information, the smart phone can carry, solved the problem of the past that medical staff must stay in front of the computer, it can understand infusion information at any time, in time to tackle the problem of infusion and get the alarm information, and improves the work efficiency of medical personnel.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Ke, Yu Cao, Chang Fu Li, and Wei Ye Liu. "The Simulation of DS-UWB RAKE Receiver over the Multipath Channel." Advanced Materials Research 989-994 (July 2014): 3868–71. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3868.

Full text
Abstract:
Ultra-Wideband (UWB) wireless communication is a new potential communication technology currently in its field. It becomes very popular in the world since it’s high performance, low radicalization and low cost. Currently UWB wireless system, we can call it Impulse Radio technology too, be invented in 20 century 1960s. But it was only used in military affairs field, bailout searching, radar location and so on. After civil using, it usually is used in indoor wireless LAN .In this paper, the development and application of UWB are introduced, the characteristic and limitation of UWB are simply analyzed. According to the simulating depending on Multipath channel, it shows increasing SNR about 1.5dB to the base of primary power district or increasing SNR about 1dB to primary power district and minor power district, we can get whole performance of RAKE receiver in perfect channel.
APA, Harvard, Vancouver, ISO, and other styles
48

Heejung Yu, Myung-Soon Kim, Eun-young Choi, Taehyun Jeon, and Sok-kyu Lee. "Design and prototype development of MIMO-OFDM for next generation wireless LAN." IEEE Transactions on Consumer Electronics 51, no. 4 (November 2005): 1134–42. http://dx.doi.org/10.1109/tce.2005.1561835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hundt, O., R. Kays, B. Aznar, W. Endemann, and C. Schilling. "Methods to Improve the Efficiency of Wireless LAN for Multimedia Home Networks." IEEE Transactions on Consumer Electronics 53, no. 2 (2007): 397–404. http://dx.doi.org/10.1109/tce.2007.381707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kim, Hyerin, and Jungmin So. "Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information." Applied Sciences 11, no. 22 (November 22, 2021): 11074. http://dx.doi.org/10.3390/app112211074.

Full text
Abstract:
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA (Carrier-Sense Multiple Access)-based medium access control of current wireless network systems suffers from significantly degraded performance when the network becomes dense. Recent WLAN (Wireless Local Area Networks) standards include measures for increasing spatial reuse such as BSS (Basic Service Set) coloring, but the schemes based on BSS coloring such as OBSS/PD (Overlapping BSS/Preamble Detection) have limitations in improving spatial reuse. In this paper, we propose a spatial reuse method for uplink which can utilize BSS color and proximity information to improve the efficiency of carrier sensing and thus spatial reuse. Specifically, through the BSS color and the proximity information, a node receiving a preamble can figure out how far the receiver of the ongoing traffic is located. This information is used to determine whether the node should aggressively start transmitting or defer its transmission to protect the ongoing transmission. Simulation results show that the proposed method outperforms existing methods in terms of throughput and fairness.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography