Academic literature on the topic 'WLAN'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'WLAN.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "WLAN"
Durresi, Arjan, Mimoza Durresi, and Leonard Barolli. "Secure Authentication in Heterogeneous Wireless Networks." Mobile Information Systems 4, no. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.
Full textPolgár, Zsolt Alfréd, Andrei Ciprian Hosu, Zsuzsanna Ilona Kiss, and Mihály Varga. "Vertical Handover Decision Algorithm for Heterogeneous Cellular-WLAN Networks." MACRo 2015 1, no. 1 (March 1, 2015): 1–12. http://dx.doi.org/10.1515/macro-2015-0001.
Full textKhuder, Enaam F. "Performance Analysis of Industrial WLAN Based on EDCA Scheme Defined in IEEE802.11e." Tikrit Journal of Engineering Sciences 21, no. 1 (July 18, 2013): 24–34. http://dx.doi.org/10.25130/tjes.21.1.04.
Full textEtta, Victor Ojong, Arif Sari, Agbotiname Lucky Imoize, Piyush Kumar Shukla, and Musah Alhassan. "Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique." Mobile Information Systems 2022 (June 30, 2022): 1–21. http://dx.doi.org/10.1155/2022/7936236.
Full textJardosh, Amit P., Konstantina Papagiannaki, Elizabeth M. Belding, Kevin C. Almeroth, Gianluca Iannaccone, and Bapi Vinnakota. "Green WLANs: On-Demand WLAN Infrastructures." Mobile Networks and Applications 14, no. 6 (December 9, 2008): 798–814. http://dx.doi.org/10.1007/s11036-008-0123-8.
Full textZola, Enrica, and Francisco Barcelo-Arroyo. "Characterizing User Behavior in a European Academic WiFi Network." International Journal of Handheld Computing Research 4, no. 2 (April 2013): 55–68. http://dx.doi.org/10.4018/jhcr.2013040104.
Full textDebnath, Sumon Kumar, Prodip Kumar Sarker, Md Manowarul Islam, and Ileas Pramanik. "Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication." International Journal on AdHoc Networking Systems 11, no. 1 (January 31, 2021): 1–13. http://dx.doi.org/10.5121/ijans.2021.11101.
Full textParashar, Vivek, Ramgopal Kashyap, Ali Rizwan, Dimitrios A. Karras, Gilder Cieza Altamirano, Ekta Dixit, and Fardin Ahmadi. "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–11. http://dx.doi.org/10.1155/2022/4464447.
Full textShin, Sungjin, Donghyuk Han, Hyoungjun Cho, and Jong-Moon Chung. "Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO." Mobile Information Systems 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4868479.
Full textPark, Jaehyoung, Yonggang Kim, Gyungmin Kim, and Hyuk Lim. "Majority Voting-Based MAC Protocol for Exploiting Link-Layer Diversity in Wireless Networks." Sensors 21, no. 8 (April 12, 2021): 2706. http://dx.doi.org/10.3390/s21082706.
Full textDissertations / Theses on the topic "WLAN"
Memon, Abdul Qudoos, Ali Hasan Raza, and Sadia Iqbal Iqbal. "WLAN Security : WLAN Security." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4379.
Full textWLANs are become popular due to their different advantages. Beside all these advantages WLANs are also facing the major problem of the security, so that why lots of people are doing research on WLAN to improve the security because many companies want to transfer their sensible data over WLAN.
This report discusses the security issues of WLAN based on IEEE 802.11 standard, such type of networks are referred to as wifi network. WLAN is deployed as an extension of already existed wired LAN. Therefore it is necessary to provide the security of WLAN equals to Wired LAN.
We worked in a lab environment in order to configure the three different security solutions (WEP, WPA & WPA2 using IEEE 802.1X and RADIUS Server) on infrastructure mode for personnel and enterprise architecture of WLAN. For each security solution we used the backtrack as a security cracking tool, in order to break the WEP (64 and 128 bit long) security key of WLAN, make comparison between 64 and 128 bit long WEP key and also analyzed the different kind of attacks and some drawbacks of using WEP security in WLAN. In the same way configure the WPA and WPA2 (using IEEE 802.1X and RADIUS Server) security solution in infrastructure mode of WLAN and use the same security cracking tool backtrack in order to break the security of the WLAN and analyze the different attacks on the network in these architecture and drawbacks of using WPA and WPA2 Security solutions. By using IEEE 802.1X and RADIUS Server we can improve the security of the enterprise network.
In the end we come with many conclusions and suggestions that will help in order to provide better security while deploying Wireless LAN.
Opponents: Ali Murtaza & Mansoor Ahmed
Nyman, Pontus, and Stefan Sand. "Industrial WLAN." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20340.
Full textWLAN in the form of IEEE 802.11 is not used to any wide extent in the industrial environment. We examine how the protocol can be used for data communication in such an environment with regard to noise immunity and computing power needs, in the form of an empirical investigation. These studies have been conducted in an industrial environment with the three most commonly used standards IEEE 802.11b/g/n. The purpose of this paper is to understand what it is in the environment that disturbs signals and if the newest standard IEEE 802.11n has something new to add to the table that could revolutionize the focus. Tests and studies have shown that 802.11b and 802.11n is the best in terms of signal strength with interference in the environment. 802.11n is superior in terms of high bit rate.
Nordqvist, Petter. "CAN-WLAN brygga." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-58130.
Full textThis report covers the construction of a CAN-WLAN bridge from a basic schematic all the way to a consumer ready product. The bridge uses the microprocessor AT90CAN128 and the WLAN module WIZ610wi which handles the communication of CAN and WLAN. The bridge is designed to be mounted stationary on a machine/vehicle which communicates through CAN. With a Smartphone or laptop you can then read the information on the CAN bus or send a CAN package. Everything is done through the web browser on the mobile device. Power supply and enclosure has been designed by the Electrum Automation. The remaining blocks have been designed from the ground up and is covered by this report. The bridge is generally designed to be able to communicate all types of CAN-busses with tunable parameters considering baud rate, id-length, etc.
Yeo, Jihwang. "WLAN workload characterization." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2825.
Full textThesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Strand, Erlend Barstad. "WISA vs. WLAN: Co-existence challenges : - A tool for WLAN performance testing." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8789.
Full textWireless Interface for Sensors and Actuators (WISA) is ABB's proprietary wireless protocol for industrial automation on the factory floor. It operates in the 2.4GHz ISM band. Wireless Local Area Networks (WLANs), which typically occupy a fixed portion of the same 2.4GHz ISM band, are becoming more and more common on the factory floor. This raises a question of co-existence and how the performance of traffic over WLAN is affected when interfered by WISA. This report is a result of the development of a software tool and assembly of hardware that can aid the future testing of the effect WISA has on nearby WLANs. Together with the explanation of the usage of this software tool, this report will also investigate different arrangements of hardware components that are used to demonstrate and test the functionality of this new software tool. The software tool and the hardware components enable the measurement of important traffic metrics between two computers that communicate over a WLAN. The hardware components include a WISA Base Station (BS) that is configurable through the software tool and is used to cause interference on the WLAN.
Andersson, Pierre, and Arvid Norlander. "Indoor Positioning Using WLAN." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-23461.
Full textDenna rapport evaluerar olika metoder för att bestämma positionen av en smartphone som använder sig av Android-plattformen. Metoden skall inte använda sig av någon speciell hårdvara eller infrastruktur samt kunna hantera förhållanden där GPS är otillgängligt eller opålitligt, som till exempel inomhus. Den beskriver också implementation av ett sådant system som använder sig av en deterministisk fingerprinting-metod som någorlunda väl kan hantera enheter av olika modeller, en metod som innebär att man mäter upp en mängd med referenspunkter, kallade fingerprints, och använder dessa för att placera användaren. Projektet utfördes på uppdrag av Sigma, ett svenskt mjukvarukonsultbolag.
Plaisner, Denis. "LTE-Advanced/WLAN testbed." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316419.
Full textFalade, Olumuyiwa, and Marcellus Botsio. "Mobile IP Handover for WLAN." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4903.
Full textThe past few years have seen great increases in the use of portable devices like laptops, palmtops, etc. This has also led to the dramatic increase demand on wireless local area networks (WLAN) due to the flexibility and ease of use that it offers. Mobile IP and handover are important issues to be considered as these devices move within and between different networks and still have to maintain connectivity. It is, therefore, imperative to ensure seamless mobile IP handover for these devices as they move about.
In this thesis we undertake a survey to describe the real processes involved in mobile IP handover in WLAN environment for different scenarios. Our work also identifies individual sources of delay during the handoff process, the sum total of which makes up the total latency. Other factors that could militate against the aim of having a seamless handoff in an inter-subnet network roaming were also considered as well as some proposed solutions. These factors are security, packet loss and triangle routing.
Horndahl, Charles, and Kristian Maric. "WLAN : Oskyddad och okontrollerad datakommunikation." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-236.
Full textThis master’s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:
- What security weaknesses are present with the WLAN-technology and how can these be avoided?
- How does the wireless infrastructure in the Jonkoping region look like?
- Why do companies implement the WLAN-technology?
- Are the companies aware of the risks involved with WLAN?
We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures. The second step of the study was to scan the wireless networks in Jonkoping, Gnosjo and Nassjo in order to create a picture of the wireless infrastructure of the region. The third step of the study was to contact companies that we found in the second step for interviews to investigate their awareness of the technology and its weaknesses.
We found that WLANs and their security measures have weaknesses. The commonly used WEP encryption can quite easily be broken and can lure users into a false sense of security. The study shows that companies are aware of this weakness, but use the encryption be-cause it offers a good level of usability and security. It is a compromise between usability and security. Usability is one of the major factors for companies when implementing wireless networks, companies strive for mobility, easy access and ease of use, which the WLAN technology offers. This has lead to an extended wireless infrastructure in cities within the region where one, with ease, can find wireless networks outside buildings. We have noticed an increase in the security awareness as our empirical findings differ from earlier research conducted in other cities. When these studies are compared you can see a trend where the number of unprotected networks decreases. Our contribution to increased wireless security is a checklist of possible security measures to minimize the security threats.
Denna magisteruppsats undersöker tekniken och säkerhetsmedvetandet gällande trådlösa nätverk (WLAN). Då det tidigare uppmärksammats i media och teori att många trådlösa nätverk står oskyddade har detta skapat intresse att undersöka fenomenet i Jönköpingsregionen. Studien baseras på följande frågeställningar:
- Vilka säkerhetsluckor finns i WLAN och hur kan dessa undvikas?
- Hur ser WLAN-infrastrukturen ut i Jönköpingsregionen?
- Varför implementerar företag WLAN-tekniken?
- Är företag medvetna om riskerna med trådlösa nätverk?
För att skapa en helhetsbild har vi genomfört studien i tre steg varav vi, i det första steget, genomfört dataintrång i en kontrollerad miljö för att undersöka svagheterna med säkerhetsfunktionerna som används i trådlösa nätverk. I det andra steget undersökte vi med hjälp av bärbar dator trådlösa nätverk i Jönköping, Gnosjö och Nässjö. Detta för att skapa oss en uppfattning om hur WLAN-infrastrukturen ser ut i dagsläget. Steg tre innebar intervjuer med företag som vi funnit i samband med steg två rörande deras medvetenhet om tekniken och dess brister.
Teorin och vår empiri gav oss underlag att dra slutsatser utifrån våra frågeställningar. Vi fann att WLAN och dess säkerhetsfunktioner har vissa sårbarheter. Den mest förekommande krypteringstekniken, WEP, kan dekrypteras tämligen enkelt och kan vagga in användarna i en falsk säkerhet. Studien visar att företagen är medvetna om detta, men att det handlar om en medveten kompromiss mellan användarvänlighet och säkerhet. Användarvänligheten står till grund för varför företagen väljer att implementera den trådlösa tekniken. Företag eftersträvar mobilitet, smidighet och enkel access, vilket den trådlösa tekniken erbjuder. Detta har lett till en utökad trådlös infrastruktur i städer runtom i regionen där man med lätthet kan hitta trådlösa nätverk utanför byggnader. Vi har noterat ett ökat säkerhetsmedvetande då våra empiriska resultat skiljer sig något från tidigare undersökningar i andra städer. När dessa ställs mot varandra anar man en trend där antalet oskyddade trådlösa nätverk minskar. Vårt bidrag till ökad trådlös säkerhet är en checklista med möjliga åtgärder för att minimera säkerhetsriskerna.
Elgström, John, and Daniel Teige. "Säkerhet i WLAN för myndigheter." Thesis, Örebro University, Swedish Business School at Örebro University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-4880.
Full textI datornätverk blir användandet av WLAN (trådlösa nätverk) allt vanligare tack vare sin smidighet. Det är framförallt bekvämare att använda trådlösa nätverk då man slipper allt kablage och ofta är oberoende av var man befinner sig för att använda nätverket. Trådlösa nätverk är dock inte helt problemfria. Den främsta anledningen till detta är att informationen färdas genom radiovågor istället för genom kablade nätverk. Detta gör att WLAN är i riskzonen för avlyssning, där informationen kan utsättas för obehörig åtkomst om den inte är väl skyddad. Detta problem är grunden till denna uppsats.
Den här uppsatsen är en utredning som har gått ut på att ta fram generella riktlinjer för hur myndigheter skall uppnå god säkerhet i WLAN. Anledningen till att vi ville ta fram generella riktlinjer åt myndigheter var på grund av en rapport vi fann genomförd av krisberedskapsmyndigheten (KBM) 2008. Denna uppmärksammade att myndigheter ofta hoppar på nya tekniker utan att ha tillräckligt kunskap nog om dem, och att säkerhetstänket ofta får låg prioritet vid införandet av nya system. Ytterligare en artikel skapade av KBM från 2007, pekar på att myndigheter även har bristande säkerhet i sina DNS-system.
Eftersom vi koncentrerade oss på WLAN funderade vi då på, om nu säkerhetstänket får så låg prioritet och är så dåligt ställt i myndigheternas DNS-system, hur är det då ställt med säkerheten i WLAN?
Vi konstaterade efter att vi gjort förfrågningar till flera myndigheter, att ytterst få myndigheter hade något WLAN eller planerade att införskaffa det. Anledning till detta tror vi var att myndigheter var skeptiska till att det går att få ett WLAN säkert och hade bristande kunskap inom området.
Vi tog fram de generella riktlinjerna genom en kvalitativ metodansats, där vi genomfört litteraturstudier, undersökning av myndigheters policys samt intervju av expert på WLAN.
Resultatet visade att myndigheter behöver både administrativa säkerhetsåtgärder, tekniska säkerhetsåtgärder samt en specifik fysisk säkerhetsåtgärd för att uppnå god säkerhet i WLAN.
Books on the topic "WLAN"
Wireless local area network (WLAN) best practices guide. [Edmonton]: Stakeholder Technology Branch, 2007.
Find full textYong, Su-Khiong SK, Pengfei Xia, and Alberto Valdes-Garcia, eds. 60 GHz Technology for Gbps WLAN and WPAN. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470972946.
Full textNeeli, Prasad, and Prasad Anand, eds. WLAN systems and wireless IP for next generation communications. Boston, MA: Artech House, 2002.
Find full textMedosch, Armin. Freie Netze: Geschichte, Politik und Kultur offener WLAN-Netze. Hannover: Heise, 2004.
Find full textImmler, Christian. Windows 7 Pannenhilfe: WLAN, Internet & E-Mail, Fotos & Musik. Poing: Franzis, 2011.
Find full textLTE, WIMAX, and WLAN network design, optimization and performance analysis. Chichester, West Sussex, U.K: Wiley, 2011.
Find full textMohammadi, Behnam. A 5.8 GHz CMOS low noise amplifier for WLAN applications. Ottawa: National Library of Canada, 2003.
Find full textMa, Dennis Kwok-Leung. A subharmonically-injected quadrature LO generator for 17GHz WLAN applications. Ottawa: National Library of Canada, 2003.
Find full textKorowajczuk, Leonhard. LTE, WIMAX and WLAN Network Design, Optimization and Performance Analysis. Chichester, UK: John Wiley & Sons, Ltd, 2011. http://dx.doi.org/10.1002/9781119970460.
Full textN, Plataniotis Konstantinos, and Venetsanopoulos, A. N. (Anastasios N.), 1941-, eds. WLAN positioning systems: Principles and applications in location-based services. Cambridge: Cambridge University Press, 2012.
Find full textBook chapters on the topic "WLAN"
Colhoun, O. "WLAN." In Springer Reference Medizin, 2514. Berlin, Heidelberg: Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-48986-4_3329.
Full textColhoun, O. "WLAN." In Lexikon der Medizinischen Laboratoriumsdiagnostik, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-49054-9_3329-1.
Full textOsterhage, Wolfgang W. "WLAN." In Sicherheitskonzepte in der mobilen Kommunikation, 7–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57903-9_3.
Full textOsterhage, Wolfgang W. "WLAN Architektur." In sicher & mobil, 45–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_3.
Full textOsterhage, Wolfgang W. "WLAN Geräte." In sicher & mobil, 57–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_4.
Full textShekhar, Shashi, and Hui Xiong. "WLAN Geolocation." In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1496.
Full textShekhar, Shashi, and Hui Xiong. "WLAN Localization." In Encyclopedia of GIS, 1273. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_1497.
Full textAnamalamudi, Satish, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu. "5G-WLAN Security." In A Comprehensive Guide to 5G Security, 143–63. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119293071.ch7.
Full textOsterhage, Wolfgang W. "Grundzüge des WLAN." In sicher & mobil, 3–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-03083-3_2.
Full textSchwenk, Jörg. "Drahtlose Netzwerke (WLAN)." In Sicherheit und Kryptographie im Internet, 91–110. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29260-7_6.
Full textConference papers on the topic "WLAN"
Chen, Eason, Jeng Yuan Lai, Ming Zong Wang, Yu-Po Wang, and C. S. Hsiao. "Optimized Thermal Design for USB-WLAN Module." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-82247.
Full textNanda, Rohan, and P. Venkata Krishna. "D0M-WLAN." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523575.
Full text"WLAN/WPAN." In 2006 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2006. http://dx.doi.org/10.1109/isscc.2006.1696191.
Full textChien, George, and Mototsugu Hamada. "WLAN/Bluetooth." In 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers. IEEE, 2007. http://dx.doi.org/10.1109/isscc.2007.373541.
Full textBehzad, Arya, and Tadashi Maeda. "WLAN/WPAN." In 2008 International Solid-State Circuits Conference - (ISSCC). IEEE, 2008. http://dx.doi.org/10.1109/isscc.2008.4523203.
Full textKrätzer, Christian, Jana Dittmann, Andreas Lang, and Tobias Kühne. "WLAN steganography." In Proceeding of the 8th workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1161366.1161371.
Full textMing-Chia Jiang, Jyh-Cheng Chen, and Yi-Wen Liu. "WLAN-centric authentication in integrated GPRS-WLAN networks." In 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484). IEEE, 2003. http://dx.doi.org/10.1109/vetecf.2003.1285928.
Full textDebBarma, Diptanil. "Energy efficient RoF based centralized enterprise WLAN (CE-WLAN)." In IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON). IEEE, 2015. http://dx.doi.org/10.1109/eurocon.2015.7313695.
Full textLee, Kimin, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin, and Song Chong. "Just-in-time WLANs: On-demand interference-managed WLAN infrastructures." In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications. IEEE, 2016. http://dx.doi.org/10.1109/infocom.2016.7524451.
Full textPackiaraj, D., M. Ramesh, A. T. Kalghatgi, and K. J. Vinoy. "Dual band(WLAN." In 2011 National Conference on Communications (NCC). IEEE, 2011. http://dx.doi.org/10.1109/ncc.2011.5734739.
Full textReports on the topic "WLAN"
Kaippallimalil, J., R. Pazhyannur, and P. Yegani. Mapping Quality of Service (QoS) Procedures of Proxy Mobile IPv6 (PMIPv6) and WLAN. RFC Editor, June 2015. http://dx.doi.org/10.17487/rfc7561.
Full textThangavel, Kalavathi Devi, Sakthivel Palaniappan, and Sathish Kumar Shanmugam. Performance Analysis of VLSI Architecture of Viterbi Decoder in WLAN Using the Sleepy Keeper Technique. "Prof. Marin Drinov" Publishing House of Bulgarian Academy of Sciences, August 2020. http://dx.doi.org/10.7546/crabs.2020.08.11.
Full textHousley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, May 2004. http://dx.doi.org/10.17487/rfc3770.
Full textHousley, R., and T. Moore. Certificate Extensions and Attributes Supporting Authentication in Point-to-Point Protocol (PPP) and Wireless Local Area Networks (WLAN). RFC Editor, February 2006. http://dx.doi.org/10.17487/rfc4334.
Full textKrishnan, Michael N. Exploiting Spatial Channel Occupancy Information in WLANs. Fort Belvoir, VA: Defense Technical Information Center, May 2014. http://dx.doi.org/10.21236/ada605338.
Full textMasica, K. Recommended Practices Guide Securing WLANs using 802.11i. Office of Scientific and Technical Information (OSTI), October 2006. http://dx.doi.org/10.2172/1036841.
Full textSouppaya, M. P., and K. A. Scarfone. Guidelines for securing Wireless Local Area Networks (WLANs). Gaithersburg, MD: National Institute of Standards and Technology, 2012. http://dx.doi.org/10.6028/nist.sp.800-153.
Full text