To see the other types of publications on this topic, follow the link: WLAN.

Journal articles on the topic 'WLAN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'WLAN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Durresi, Arjan, Mimoza Durresi, and Leonard Barolli. "Secure Authentication in Heterogeneous Wireless Networks." Mobile Information Systems 4, no. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.

Full text
Abstract:
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Polgár, Zsolt Alfréd, Andrei Ciprian Hosu, Zsuzsanna Ilona Kiss, and Mihály Varga. "Vertical Handover Decision Algorithm for Heterogeneous Cellular-WLAN Networks." MACRo 2015 1, no. 1 (March 1, 2015): 1–12. http://dx.doi.org/10.1515/macro-2015-0001.

Full text
Abstract:
AbstractMulti-access and heterogeneous wireless communications are considered to be one of the solutions for providing generalized mobility, high system efficiency and improved user experience, which are important characteristics of the Next Generation Networks. This paper proposes a Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN VHO decisions are taken based on parameters which characterize both the coverage and the traffic load of the WLANs. Computer simulations performed in complex scenarios show that the proposed algorithm ensures better performance compared to “classical” VHO decision algorithms.
APA, Harvard, Vancouver, ISO, and other styles
3

Khuder, Enaam F. "Performance Analysis of Industrial WLAN Based on EDCA Scheme Defined in IEEE802.11e." Tikrit Journal of Engineering Sciences 21, no. 1 (July 18, 2013): 24–34. http://dx.doi.org/10.25130/tjes.21.1.04.

Full text
Abstract:
In the last few years wireless local area network (WLAN) technology and products have grownunusually. This growth has encouraged many researchers to employ WLAN technology in differentapplication Areas. Recently, using IEEE 802.11 WLAN in industrial automation applications is attractiveand more interesting. However, the currently used medium access mechanism makes WLANs nondeterministicand hence not suitable for industrial real-time traffic. Legacy IEEE 802.11 WLANs wereinitially designed for best effort traffic only and did not provide any QoS support for this kind of traffic.The new amendment IEEE 802.11e standard was introduced and ratified in 2005. It defines the concept ofa Hybrid Co-ordination Function (HCF) at the MAC layer for medium access control. HCF is acombination of HCF Controlled Channel Access (HCCA) with parameterized quality of service (QoS)and Enhanced Distribution Channel Access (EDCA) with prioritized QoS. Enhanced DistributionChannel Access (EDCA) is an enhanced version of Distributed Coordination Function )DCF( mechanismused in the original IEEE 802.11 WLAN. This paper analyze the performance of the EDCA in anindustrial automation network with real-time requirements by means of a simulation with the networksimulator OPNET 11.5 and compares the results with the DCF in terms of latency and throughput invarious scenarios.
APA, Harvard, Vancouver, ISO, and other styles
4

Etta, Victor Ojong, Arif Sari, Agbotiname Lucky Imoize, Piyush Kumar Shukla, and Musah Alhassan. "Assessment and Test-case Study of Wi-Fi Security through the Wardriving Technique." Mobile Information Systems 2022 (June 30, 2022): 1–21. http://dx.doi.org/10.1155/2022/7936236.

Full text
Abstract:
This study aims to investigate Wireless Local Area Network (WLAN) within the context of its applicability as a 21st-century business tool and its survivability in a security threat-infested cyber landscape. WLAN security leverages the Wardriving technique deployed within geolocation to scan for WLAN density and explore the associated security mechanisms. Specifically, the study adopts two approaches; the first part reviews relevant research articles in electronic libraries and databases on WLAN security based on wardriving techniques. The other part comprises a measurement campaign conducted in a mid-sized city in North Cyprus. The field measurement aims to underscore the claims from the literature to find out how the security encryption technologies are used. In particular, the goal is to determine the availability of WLAN infrastructure and monitor how the security measures are implemented in Northern Cyprus. The main objective is to determine the security state of WLAN in Cyprus and examine how it can be generalized for related environments. In order to completely grasp the research issue posed in this study, data analyses from several perspectives are analyzed and examined critically. The wardriving approach has been used in this work to crawl wider regions for examination. This study was conducted with security findings drawn only from publicly accessible information emitted by each investigated wireless access point. The channel usage, Service Set IDentifier (SSID) security, the Encryption type (Open, WEP, WPA, WPA2, WPA3, and Mixed mode), WPS usage statistics, geographical locations, detailed security statistics described in Wigle CSV format, and vendor statistics are highlighted. Generally, results indicate that 21,345 WLANs were detected. From the detected WLANs, 23 (0.1 percent) used WEP encryption, 18 (0.08 percent) used WPA-TKIP encryption, 5,359 (25.1 percent) were unencrypted, and a clear majority of 9,139 (42.82 percent) used the more secure WPA2 encryption, while 13 networks (0.06 percent) used the latest WPA3 encryption technique. The results imply that WLAN security in Cyprus can be said to be moderate. Thus, this study adds to the expanding corpus of research on WLAN security and Wardriving to all parties in the wireless security ecosystem. The current study examines WLAN operations in North Cyprus while pointing to future research directions on Wireless LAN security mechanisms. Overall, the dataset from the wardriving experiment is novel and would serve future research exploration in the wireless security systems domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Jardosh, Amit P., Konstantina Papagiannaki, Elizabeth M. Belding, Kevin C. Almeroth, Gianluca Iannaccone, and Bapi Vinnakota. "Green WLANs: On-Demand WLAN Infrastructures." Mobile Networks and Applications 14, no. 6 (December 9, 2008): 798–814. http://dx.doi.org/10.1007/s11036-008-0123-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zola, Enrica, and Francisco Barcelo-Arroyo. "Characterizing User Behavior in a European Academic WiFi Network." International Journal of Handheld Computing Research 4, no. 2 (April 2013): 55–68. http://dx.doi.org/10.4018/jhcr.2013040104.

Full text
Abstract:
Wireless local area networks (WLANs) are commonplace in many universities. Understanding the trends in the usage of these networks is becoming more important. Interesting results can be extracted about association patterns by analyzing WLAN traces from real scenarios. In this work, the library in the main campus of the Technical University of Catalonia (UPC) in Barcelona has been studied. Daily and weekly patterns of the WLAN connections are shown. The population accessing the network is mostly composed of infrequent users: half of the population accesses the WLAN once during each month. Many users associate to only one of the twelve possible access points, which means that, despite the widespread use of lightweight devices, many users are static. The results of this analysis provide general tools for characterizing campus-wide WLAN and a better understanding of usage and performance issues in a mature wireless network.
APA, Harvard, Vancouver, ISO, and other styles
7

Debnath, Sumon Kumar, Prodip Kumar Sarker, Md Manowarul Islam, and Ileas Pramanik. "Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication." International Journal on AdHoc Networking Systems 11, no. 1 (January 31, 2021): 1–13. http://dx.doi.org/10.5121/ijans.2021.11101.

Full text
Abstract:
For an efficient design of wireless local-area networks (WLANs), the simulation tools are important to accurately estimate the IEEE 802.11n/ac link features for WLANs. However, this true simulation of network behavior is critical in designing high-performance WLANs. Through testing, analysis, and modeling of the proposed scheme repetitively, the design of the WLAN can be enhanced with a small budget before making its practical implementation. Many network simulation tools have been established to give solutions for this request and ns-3 is the most widely used tools among them by the research industry as an open-source network simulator. In this paper, we examine the various link features of the 802.11n WLANs under several conditions. We investigate the effects of 802.11n WLAN modulation and coding schemes (MCSs), 20MHz single channel or 40 MHz bonded channel, guard intervals (GI), frame aggregation, data encoding, number of antennas and their data rate, and link distance features of 802.11n WLAN in ns-3 when only a unique host connects with the access point (AP) and generates data traffic. Besides, the performance for an enterprise scenario proposed by the IEEE 802.11ax study group is evaluated when several hosts are simultaneously creating traffic with their associated APs. The results demonstrate that ns-3 support most of the link features of the 802.11n protocol with significant accuracy.
APA, Harvard, Vancouver, ISO, and other styles
8

Parashar, Vivek, Ramgopal Kashyap, Ali Rizwan, Dimitrios A. Karras, Gilder Cieza Altamirano, Ekta Dixit, and Fardin Ahmadi. "Aggregation-Based Dynamic Channel Bonding to Maximise the Performance of Wireless Local Area Networks (WLAN)." Wireless Communications and Mobile Computing 2022 (June 7, 2022): 1–11. http://dx.doi.org/10.1155/2022/4464447.

Full text
Abstract:
Channel bonding is considered by the IEEE 802.11ac amendment to improve wireless local area network (WLAN) performance. In this article, the channel bonding and aggregation method were proposed to increase wireless local area network performance (WLANs). It combines many channels (or lanes) to boost the capacity of modem traffic. Channel bonding is the combination of two neighbouring channels within a certain frequency band to increase wireless device throughput. Wi-Fi employs channel bonding, also known as Ethernet bonding. Channel bandwidth is equal to the uplink/downlink ratio multiplied by the operational capacity. A single 20 MHz channel is divided into two, four, or eight power channels. At 80 MHz, there are more main and smaller channels. Performance of short-range WLANs is determined through graph-based approach. The two-channel access techniques including channel bonding proposed for the IEEE 802.11ac amendment are analysed and contrasted. The novel channel sizing algorithm based on starvation threshold is proposed to expand the channel size to improve WLAN performance. Second-cycle throughput is estimated at 20 Mbps, much beyond the starvation threshold. Our test reveals access points (AP) 1, 2, and 4 have enough throughput. A four-AP WLAN with a 5-Mbps starvation threshold is presented. C160 = 1 since there is only one 160 MHz channel. MIR (3, 160 (a, a, a)) =0, indicating that AP 3’s predicted throughput is 0. The algorithm rejects the 160 MHz channel width since ST is larger than 0. The channel width in MHz is given by B =0,1 MIR. The MIR was intended to maximise simultaneous broadcasts in WLANs. The authors claim that aggregation with channel bonding outperforms so all WLAN APs should have a single-channel width. It usually outperforms fairness-based measures by 15% to 20%. Wi-Fi standards advise “channel bonding,” or using higher frequency channels. Later standards allow channel bonding by increasing bands and channel lengths. Wider channels enhance average WLAN AP throughput, but narrower channels reduce appetite. Finally, it is concluded that APs are more useful than STAs.
APA, Harvard, Vancouver, ISO, and other styles
9

Shin, Sungjin, Donghyuk Han, Hyoungjun Cho, and Jong-Moon Chung. "Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO." Mobile Information Systems 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/4868479.

Full text
Abstract:
The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs) are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO) and vertical handover (VHO) support for WLAN mobile devices is important. A significant improvement in quality of service (QoS) can be obtained by reducing the association and disassociation interruption time for user equipment (UE) servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI) in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP) or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT) and improve the throughput performance is proposed.
APA, Harvard, Vancouver, ISO, and other styles
10

Park, Jaehyoung, Yonggang Kim, Gyungmin Kim, and Hyuk Lim. "Majority Voting-Based MAC Protocol for Exploiting Link-Layer Diversity in Wireless Networks." Sensors 21, no. 8 (April 12, 2021): 2706. http://dx.doi.org/10.3390/s21082706.

Full text
Abstract:
In wireless local area networks (WLANs), the effect of interference signals between neighboring nodes increases as the number of wireless nodes using limited radio frequency resources in a limited space increases, which can significantly degrade the reliability of data transmission. In high-density WLANs, there can be several neighboring access points (APs) that can receive uplink transmission from a station. In conventional medium access control (MAC) protocols, uplink data frames containing errors or transmitted from a non-associated station are discarded at APs. Alternatively, we propose a MAC protocol using redundant wireless links between neighboring APs and the non-associated stations. In the proposed MAC protocol, we consider a centralized WLAN with a control node that performs error corrections of erroneous uplink data frames via a majority voting algorithm-based link-layer diversity scheme using uplink data received from multiple APs to increase the reliability of data transmission. In addition, we propose an adaptive carrier sensing ranging mechanism to improve the uplink network throughput in the proposed centralized WLAN system. Further, we conduct simulation studies and software-defined radio-based experiments to evaluate the performance of the proposed MAC protocol in various WLAN scenarios.
APA, Harvard, Vancouver, ISO, and other styles
11

Haswendra, Aditya Reza. "AN OVERVIEW OF LAN/WLAN IN CAD/CAM/CAE APPLICATIONS." Journal of Mechanical Science and Engineering 7, no. 1 (October 7, 2020): 007–11. http://dx.doi.org/10.36706/jmse.v7i1.35.

Full text
Abstract:
Computer network is an interface of two or more computers that is built for the purpose of sharing, information, data, and resources. Computer network has nodes that serve as the origin, route, and receiver of data. Computer network is built using a combination of hardware and software. LANs and WLANs are the most common form of computer network and they are used intensively and extensively in CAD/CAM/CAE applications. This review talks about the latest implementation of LANs/WLANs in CAD/CAM/CAE applications, their limitations, and consideration for their usage. There are four aspects that a LAN/WLAN system must fulfill which are Fast, Expandable, Reliable, and Secure. LAN and WLAN including their many standards each has different properties which influence their implementation in CAD/CAM/CAE applications.
APA, Harvard, Vancouver, ISO, and other styles
12

Haig, Zsolt, Zsolt Illési, and Péter János Varga. "Possibilities of Electronic Jamming of WLAN Networks in the Physical Layer." Hadmérnök 17, no. 3 (November 30, 2022): 133–52. http://dx.doi.org/10.32567/hm.2022.3.9.

Full text
Abstract:
Wireless local area networks or WLANs are the necessary underlying communication technology of consumer electronics, mobile computers and mobile phones of our days. Thanks to the comfortable operations and ubiquitous applicability for work and entertainment, the demand surged for these devices in the last 15 years. WLAN solutions provide the opportunity for mobility. But these networks communicate via radio waves with devices, which can be eavesdropped on and attacked. One form of attack is jamming. This article analyses the most frequent WLAN standards and the jamming options, particularly the execution of electronic jamming in the physical layer.
APA, Harvard, Vancouver, ISO, and other styles
13

Mills, D. "WLAN." Computer Bulletin 41, no. 2 (March 1, 1999): 32. http://dx.doi.org/10.1093/combul/41.2.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Pan, Su, and Bing Jie Cai. "Heterogeneous QoS Provision Schemes over WLANs with the Equivalent Spectral Bandwidth Distribution." Applied Mechanics and Materials 713-715 (January 2015): 2250–56. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2250.

Full text
Abstract:
A call admission control (CAC) protocol is proposed for integrated service WLAN networks in this paper. A popular admission protocol is to admit the incoming calls into the WLAN networks whenever it is available so as to take advantage of low cost and large bandwidth of the WLANs. However, the popular protocol can’t guarantee the QoS of the calls. In order to guarantee the QoS, the proposed protocol maps the characteristics (such as bit rate, bit error rate) of different services into the equivalent spectral bandwidth, and dynamically distributes the equivalent bandwidth to different calls. As a result, the QoS of the calls can be guaranteed, and the spectral efficiency has been developed.
APA, Harvard, Vancouver, ISO, and other styles
15

Reggiani, Luca, Andrea Gola, Gian Mario Maggio, and Gianluigi Tiberi. "Design of Interference-Resilient Medium Access for High Throughput WLANs." International Journal of Distributed Sensor Networks 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/659569.

Full text
Abstract:
The proliferation of wireless communications systems poses new challenges in terms of coexistence between heterogeneous devices operating within the same frequency bands. In fact, in case of high-density concentration of wireless devices, like indoor environments, the network performance is typically limited by the mutual interference among the devices themselves, such as for wireless local area networks (WLANs). In this paper, we analyze a protocol strategy for managing multiple access in wireless networks. A network of sensors colocated with the WLAN terminals forms a control layer for managing the medium access and scheduling resources in order to limit collisions and optimize the WLAN data traffic; this control layer is based on a low-power wideband technology characterized by interference robustness, like CDMA (code division multiple access) or UWB (ultra-wideband) for sensors. In this work, we perform an analytical and simulative performance study of the saturated throughput, showing numerical results for the UWB-IR (Impulse Radio) sensors case and highlighting the advantage that can be provided particularly in very high capacity systems, which constitute the necessary evolution of current WLAN versions.
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Fa Gui, Xiao Yong Xing, and Ze Xiang Wu. "Dynamic Power Management for Embedded Wireless Devices." Advanced Materials Research 268-270 (July 2011): 540–45. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.540.

Full text
Abstract:
The energy consumption of WLAN card makes up a significant proportion in the embedded system, which makes the effective power management on WLAN card play an important role on energy-saving and WLAN card longevity. This paper introduces a method of dynamic power management for WLAN card: manipulating the WLAN card driver to achieve the transition state of the WLAN card, acquiring WLAN card load which ultimately achieves the dynamic power management optimization algorithm. The experiment is presented to prove the feasibility of the implementation for the purpose of energy consumption saving on WLAN card.
APA, Harvard, Vancouver, ISO, and other styles
17

Nisar, Kashif, Angela Amphawan, and Suhaidi B. Hassan. "Comprehensive Structure of Novel Voice Priority Queue Scheduling System Model for VoIP Over WLANs." International Journal of Advanced Pervasive and Ubiquitous Computing 3, no. 4 (October 2011): 50–70. http://dx.doi.org/10.4018/japuc.2011100106.

Full text
Abstract:
Voice over Internet Protocol (VoIP) has grown quickly in the world of telecommunication. Wireless Local Area Networks (WLANs) are the most performance assuring technology for wireless networks, and WLANs have facilitated high-rate voice services at low cost and good flexibility. In a voice conversation, each client works as a sender or a receiver depending on the direction of traffic flow over the network. A VoIP application requires high throughput, low packet loss, and a high fairness index over the network. The packets of VoIP streaming may experience drops because of the competition among the different kinds of traffic flow over the network. A VoIP application is also sensitive to delay and requires the voice packets to arrive on time from the sender to the receiver side without any delay over WLAN. The scheduling system model for VoIP traffic is an unresolved problem. The objectives of this paper are to identify scheduler issues. This comprehensive structure of Novel Voice Priority Queue (VPQ) scheduling system model for VoIP over WLAN discusses the essential background of the VPQ schedulers and algorithms. This paper also identifies the importance of the scheduling techniques over WLANs.
APA, Harvard, Vancouver, ISO, and other styles
18

Ali, Rashid, Muhammad Sohail, Alaa Omran Almagrabi, Arslan Musaddiq, and Byung-Seo Kim. "greenMAC Protocol: A Q-Learning-Based Mechanism to Enhance Channel Reliability for WLAN Energy Savings." Electronics 9, no. 10 (October 19, 2020): 1720. http://dx.doi.org/10.3390/electronics9101720.

Full text
Abstract:
We have seen a promising acceptance of wireless local area networks (WLANs) in our day-to-day communication devices, such as handheld smartphones, tablets, and laptops. Energy preservation plays a vital role in WLAN communication networks. The efficient use of energy remains one of the most substantial challenges to WLAN devices. Several approaches have been proposed by the industrial and institutional researchers to save energy and reduce the overall power consumption of WLAN devices focusing on static/adaptive energy saving methods. However, most of the approaches save energy at the cost of throughput degradation due to either increased sleep-time or reduced number of transmissions. In this paper, we recognize the potentials of reinforcement learning (RL) techniques, such as the Q-learning (QL) model, to enhance the WLAN’s channel reliability for energy saving. QL is one of the RL techniques, which utilizes the accumulated reward of the actions performed in the state-action model. We propose a QL-based energy-saving MAC protocol, named greenMAC protocol. The proposed greenMAC protocol reduces the energy consumption by utilizing accumulated reward value to optimize the channel reliability, which results in reduced channel collision probability of the network. We assess the degrees of channel congestion in collision probability as a reward function for our QL-based greenMAC protocol. The comparative results show that greenMAC protocol achieves enhanced system throughput performance with additional energy savings compared to existing energy-saving mechanisms in WLANs.
APA, Harvard, Vancouver, ISO, and other styles
19

Park, Eun-Chan, Bongkyo Moon, In-Hwan Kim, and Gu-Min Jeong. "Quality of Service Control for WLAN-based Converged Personal Network Service." International Journal of Computers Communications & Control 6, no. 4 (December 1, 2011): 713. http://dx.doi.org/10.15837/ijccc.2011.4.2097.

Full text
Abstract:
This paper proposes a framework for quality of service (QoS) control in WLAN-based converged personal network service (CPNS). First, we show that the CPNS devices in WLANs occupy the shared wireless channel in an unfair manner; and thus, QoS is degraded. The reasons of such problem are analyzed from two viewpoints of (i) channel access mechanism according to carrier sensing multiple access protocol of WLAN and (ii) TCP congestion control mechanism in response to packet loss. To improve QoS and assure fair channel sharing, we propose an integrated QoS control framework consisting of admission control and rate control. Based on the available capacity, the admission control determines whether or not a specific QoS service can be admitted. The rate control is implemented using congestion window control or token bucket algorithm. The proposed mechanism differentiates QoS service from best-effort (BE) service such that the QoS service is preferentially served to satisfy its QoS requirements and the BE service is served to share the remaining resource in a fair manner. The extensive simulation results confirm that the proposed scheme assures QoS and fair channel sharing for WLAN-based CPNS.
APA, Harvard, Vancouver, ISO, and other styles
20

Wan, Xili, Xinjie Guan, Wentian Zhao, Guangwei Bai, and Baek-Young Choi. "Bandwidth Cost Minimization via User Association for Enterprise WLANs." Sensors 18, no. 12 (November 23, 2018): 4104. http://dx.doi.org/10.3390/s18124104.

Full text
Abstract:
Enterprise Wireless LANs (E-WLANs) such as airport WiFi, have become a convenient way for Internet access for mobile users. In an E-WLAN, access points (APs) are usually deployed with high-density around the infrastructure to provide sufficient coverage and for a better service, where a mobile user chooses one AP to associate with among multiple available APs in the vicinity. Many studies have been done on developing user association techniques to increase system performance, with various objectives including network throughput maximization, load balancing etc. Our work is unique in that we focused on bandwidth cost minimization via user association from the perspective of the E-WLAN operators. Specifically, by considering the bandwidth demands from mobile users, we modeled the joint user association and cost minimization problem in the heterogeneous E-WLAN with additional constraints from individual bandwidth demands as an optimization problem. To solve the optimization problem efficiently, we propose an approximation algorithm using relaxation and rounding techniques. We prove that the proposed algorithm has performance bound with a constant ratio to the optimization problem. Furthermore, our simulation results exhibit the superiority of our proposed algorithm over prior schemes.
APA, Harvard, Vancouver, ISO, and other styles
21

Baidari, Ishwar, S. P. Sajjan, and Ajeet Singh. "Improving WLAN Quality of Services (Qos) Using Opnet." Oriental journal of computer science and technology 9, no. 3 (September 16, 2016): 204–11. http://dx.doi.org/10.13005/ojcst/09.03.06.

Full text
Abstract:
Wireless local area networks (WLANs) are in a period of great expansion and there is a strong need for them to support multimedia applications. With the increasing demand and penetration of wireless services, users of wireless networks now expect Quality of Service (QoS) and performance comparable to what is available from fixed networks. Providing QoS requirements like good throughput and minimum access delay are challenging tasks with regard to 802.11 WLAN protocols and Medium Access Control (MAC) functions. This research is done to study, the presently implemented schemes (the Point Coordination Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordination Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11), solves these issues and what can be done to improve them further. The metrics used were Throughput, Data Drop, Retransmission and Medium Access Delay, to analyze the performance of various MAC protocols in providing QoS to users of WLAN. Two scenarios, with same Physical and MAC parameters, one implementing the DCF and other EDCF, were created in the network simulation tool (OPNET MODELER) to obtain the results. The results showed that the performance of EDCF was better in providing QoS for real-time interactive services (like video conferencing) as compared to DCF, because of its ability to differentiate and prioritize various services. Index Terms - Wireless local area networks (WLANs),
APA, Harvard, Vancouver, ISO, and other styles
22

Suroto, Suroto. "WLAN Security: Threats And Countermeasures." JOIV : International Journal on Informatics Visualization 2, no. 4 (June 27, 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.

Full text
Abstract:
A wireless local area Network (WLAN) is being widely recognized as a viable cost effective general purpose solution in providing high speed real time access to information. With a WLAN, users can gain access to shared information without being bound to fixed plug-in-point. WLAN transmit and receive data over the air and thus collectively combine data connectivity with ease of mobility. WLAN provides wireless access to multi location enterprises, small and medium enterprises. It can replace wired LAN or simply be used as extension of wired infrastructure. Besides all these advantages WLAN are also facing major problems of security.So security is the aspect where most of the researchers are working. Following are the major objective of our study : i) To study the various Vulnerabilities and attacks on WLAN and their solutions. ii) To study the some of the exiting security methods used for securing WLAN and explore the possibility of improvements in the same. Our conclusion that WLAN security is not easy, and it is constantly changing. They expose the network to a new group of hackers. All businesses need to determine their security requirements based on the application using the WLAN. Goal so that a WLAN is as protected as Wired LAN.
APA, Harvard, Vancouver, ISO, and other styles
23

Qin, Yuan Qing, Ying Jie Cheng, and Chun Jie Zhou. "A Survey of Real-Time Industrial Wireless LAN Research." Applied Mechanics and Materials 738-739 (March 2015): 1105–10. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1105.

Full text
Abstract:
This paper mainly surveys the state-of-the-art on real-time communicaton in industrial wireless local networks(WLANs), and also identifys the suitable approaches to deal with the real-time requirements in future. Firstly, this paper summarizes the features of industrial WLANs and the challenges it encounters. Then according to the real-time problems of industrial WLAN, the fundamental mechanism of each recent representative resolution is analyzed in detail. Meanwhile, the characteristics and performance of these resolutions are adequately compared. Finally, this paper concludes the current of the research and discusses the future development of industrial WLANs.
APA, Harvard, Vancouver, ISO, and other styles
24

Kuusisto, Finn. "WLAN Security." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 64. http://dx.doi.org/10.1145/2517257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mittal, Ishu, and Mr Anshul Anand. "WLan Architecture." International Journal of Computer Trends and Technology 8, no. 3 (February 25, 2014): 148–51. http://dx.doi.org/10.14445/22312803/ijctt-v8p127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Jui-Hung Yeh, Jyh-Cheng Chen, and Chi-Chen Lee. "WLAN standards:." IEEE Potentials 22, no. 4 (October 2003): 16–22. http://dx.doi.org/10.1109/mp.2003.1238688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Knopp, Michael. "WLAN-Haftung." Datenschutz und Datensicherheit - DuD 34, no. 9 (September 2010): 653–55. http://dx.doi.org/10.1007/s11623-010-0156-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Charisma, Atik, Reja Pratama, Handoko Rusiana Iskandar, and Fauzia Haz. "Pengaruh Penambahan Slot Terhadap Kinerja Antena WLAN." ELECTRON Jurnal Ilmiah Teknik Elektro 4, no. 1 (May 31, 2023): 10–14. http://dx.doi.org/10.33019/electron.v4i1.41.

Full text
Abstract:
Salah satu perangkat yang berperan penting pada kinerja Wireless LAN (WLAN) adalah antena. Antena microstrip umumnya digunakan pada perancangan teknologi dengan frekuensi tinggi. Oleh karena itu cocok untuk meningkat kinerja WLAN yang bekerja di frekuensi 2,4 GHz. Pada penelitian ini menambahan slot pada antena untuk meningkatkan kinerja WLAN. Antena susun 2x1 yang dirancang bekerja pada frekuensi WLAN yakni 2,4 GHz. Gain yang dihasilkan antenna ini sebesar 3,8 dB yang sangat berpengaruh pada penguatan sinyal antena WLAN.
APA, Harvard, Vancouver, ISO, and other styles
29

Tsang, Philip. "Project-WLAN: a longitudinal study of WLAN experiments." International Journal of Mobile Communications 4, no. 3 (2006): 248. http://dx.doi.org/10.1504/ijmc.2006.008941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Xinheng. "Wireless mesh networks." Journal of Telemedicine and Telecare 14, no. 8 (December 2008): 401–3. http://dx.doi.org/10.1258/jtt.2008.008003.

Full text
Abstract:
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.
APA, Harvard, Vancouver, ISO, and other styles
31

Richter, Philipp, and Manuel Toledano-Ayala. "Ubiquitous and Seamless Localization: Fusing GNSS Pseudoranges and WLAN Signal Strengths." Mobile Information Systems 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/8260746.

Full text
Abstract:
Ubiquitous global positioning is not feasible by GNSS alone, as it lacks accurate position fixes in dense urban centres and indoors. Hybrid positioning methods have been developed to aid GNSS in those environments. Fingerprinting localization in wireless local area networks (WLANs) is a promising aiding system because of its availability, accuracy, and error mechanisms opposed to that of GNSS. This article presents a low-cost approach to ubiquitous, seamless positioning based on a particle filter integrating GNSS pseudoranges and WLAN received signal strength indicators (RSSIs). To achieve accurate location estimates indoors/outdoors and in the transition zones, appropriate likelihood functions are essential as they determine the influence of each sensor information on the position estimate. We model the spatial RSSI distributions with Gaussian processes and use these models to predict RSSIs at the particle’s positions to obtain point estimates of the RSSI likelihood function. The particle filter’s performance is assessed with real data of two test trajectories in an environment challenging for GNSS and WLAN fingerprinting localization. Outcomes of an extended Kalman filter using pseudoranges and a WLAN position as observation is included as benchmark. The proposed algorithm achieves accurate and robust seamless localization with a median accuracy of five meters.
APA, Harvard, Vancouver, ISO, and other styles
32

Košťál, Kristián, Rastislav Bencel, Michal Ries, Peter Trúchly, and Ivan Kotuliak. "High Performance SDN WLAN Architecture." Sensors 19, no. 8 (April 19, 2019): 1880. http://dx.doi.org/10.3390/s19081880.

Full text
Abstract:
Wireless Local Area Network (WLAN) infrastructure is a dominant technology for direct access to the Internet and for cellular mobile data traffic offloading to WLANs. Additionally, the enterprise infrastructure can be used to provide functionality for the Internet of Things and Machine to Machine scenarios. This work is focused on improvements of radio resources control scalability similar to mobile networks via handover between cells. We introduce an improved IEEE 802.11 architecture utilizing Software-Defined Networks (SDNs). The proposed architecture allows communications during device movements without losing a quality of service (QoS). The fast seamless handover with QoS enables efficient usage of radio resources in large networks. Our improvements consist of integrating wireless management to OpenFlow protocol, separating encryption and decryption from an access point. In parallel, this feature as a side effect unloads processing at the Access Points (APs). Finally, the functionality of architecture design and scalability was proven by Colored Petri Nets (CPNs). The second proof of our concept was performed on two scenarios. The first scenario was applied to a delay sensitive use case. The second scenario considers a network congestion in real world conditions. Client’s mobility was integrated into both scenarios. The design was developed to demonstrate SDN WLAN architecture efficiency.
APA, Harvard, Vancouver, ISO, and other styles
33

Ding, Ai Xia, and Wang Dan. "The Security Experience of Wireless Local Area Network at Ningbo University." Advanced Materials Research 488-489 (March 2012): 1603–8. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1603.

Full text
Abstract:
The network revolution has dramatically changed the way individuals communicate and conduct business. In the whole network system, WLAN is the most easily linked to the users. The diversity of WLAN communication makes it faced with various information security threats. This paper provides necessary and sufficient conditions for wireless network to lead to an increased security level. Concerns for WLAN security and confidentiality in a university environment were expressed in the paper. A number of recommendations are provided to initiate and promote WLAN security. The contribution of this paper is divided into three parts. Firstly, it introduces the overall network and the WLAN of Ningbo University in general. Secondly, it analyzes different WLAN protocol defects and the information security threats and attacks known in the campus LAN. Thirdly, it provides WLAN communication security precautions and the strategies adopted by our university for solution from the aspects of technique and management respectively.
APA, Harvard, Vancouver, ISO, and other styles
34

Sun, Wen Feng, and Ren Shi Yu. "Research on WLAN and Ad Hoc." Applied Mechanics and Materials 321-324 (June 2013): 2906–9. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2906.

Full text
Abstract:
Competition from all walks of life is more and more intense. So WLAN obtains a wide application. However, the main disadvantages of WLAN, coverage scope, movement speed and capacity of communication, are still unavoidable problems. Ad hoc is a good compensation for the main disadvantages of WLAN with its main advantages such as good extensibility, fast movement speed, great capacity of communication, etc. In this paper, WLAN and Ad hoc are introduced in detail, and then integrated according to their respective character. Finally, some main advantages of integration of WLAN and Ad hoc are listed.
APA, Harvard, Vancouver, ISO, and other styles
35

Stateczny, Andrzej, Krzysztof Gierlowski, and Michal Hoeft. "Wireless Local Area Network Technologies as Communication Solutions for Unmanned Surface Vehicles." Sensors 22, no. 2 (January 15, 2022): 655. http://dx.doi.org/10.3390/s22020655.

Full text
Abstract:
As the number of research activities and practical deployments of unmanned vehicles has shown a rapid growth, topics related to their communication with operator and external infrastructure became of high importance. As a result a trend of employing IP communication for this purpose is emerging and can be expected to bring significant advantages. However, its employment can be expected to be most effective using broadband communication technologies such as Wireless Local Area Networks (WLANs). To verify the effectiveness of such an approach in a specific case of surface unmanned vehicles, the paper includes an overview of IP-based MAVLink communication advantages and requirements, followed by a laboratory and field-experiment study of selected WLAN technologies, compared to popular narrowband communication solutions. The conclusions confirm the general applicability of IP/WLAN communication for surface unmanned vehicles, providing an overview of their advantages and pointing out deployment requirements.
APA, Harvard, Vancouver, ISO, and other styles
36

Rawia, Roziyani, Mohd Rizal Mohd Isa, M. N. Ismaila, Aznida Abu Bakar Sajak, and Azmi Mustafa. "Preliminary study: Readiness of WLAN Infrastructure at Malaysian Higher Education Institutes to support Smart Campus Initiative." JOIV : International Journal on Informatics Visualization 7, no. 3 (September 10, 2023): 945. http://dx.doi.org/10.30630/joiv.7.3.1242.

Full text
Abstract:
Smart campus initiative enables higher education to enhance services, decision-making, and campus sustainability. The initiatives are being actively implemented globally by higher education, including in Malaysia. The recent COVID-19 pandemic has underscored the need for the education sector to explore a digital revolution. The adaptation of digital technologies has improved many aspects, including the teaching and learning experiences and administration tasks, which results in more efficient task handling. This study investigates the readiness of the WLAN infrastructure at Malaysian Public Higher Education Institutes (HEIs) in implementing smart campus initiatives and measures readiness based on the availability of WLAN Infrastructure, WLAN logical architecture and WLAN populated coverage area. This study administered a questionnaire to 19 respondents, all of whom are IT personnel from Malaysian public HEIs to gather preliminary data on the readiness of WLAN infrastructure at Malaysian Public HEI to support the adaptation of smart campus initiatives in their teaching and learning activities. This study is a preliminary study concerning the readiness of WLAN infrastructure at Malaysian Public HEI in adapting smart campus initiatives. The findings show that, even though WLAN service is available at all Malaysian Public HEI, it is essential to enhance the adopted logical architecture and WLAN coverage to prepare HEI to become smart campuses. The findings of this study can provide the fundamental guidelines for the Ministry of Higher Education in determining the baseline of WLAN infrastructure required by Malaysian HEI to support smart campus initiatives.
APA, Harvard, Vancouver, ISO, and other styles
37

Siregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (April 29, 2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.

Full text
Abstract:
PT. St. Morita Industries has a Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, WLAN currently uses WPA2-PSK as a security system to authenticate users to access the internet. However, the use of WPA2-PSK as WLAN security still has a weakness due to the use of the same 1 password for many users in order to connect to the WLAN hotspot will be an opportunity for cyber crime. This happens because it will be very easy for irresponsible users to enter the WLAN. Therefore, in this study, captive portal authentication will be applied as an effort to increase WLAN security replaces WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method. All the configurations needed to build the captive portal authentication take advantage of the Winbox program. This research has resulted in a special user authentication limitation for users who have registered on the WLAN is permitted to access this company's internet. In addition, the Winbox program can also be used for monitoring all users connected to the WLAN, both active and inactive users. By setting up captive portal authentication on a WLAN network using a proxy routerboard device which comprises an IP address, DHCP server, hostpot setup, NAT firewall, and DNS server one can create a WPA2-PSK security system. This configuration is completed with the aid of the Winbox v3.37 software.
APA, Harvard, Vancouver, ISO, and other styles
38

Krishan, R. "Performance Characterization of Load Balancing Algorithm." Journal of Scientific Research 13, no. 3 (September 1, 2021): 915–22. http://dx.doi.org/10.3329/jsr.v13i3.53356.

Full text
Abstract:
The developing interest in mobile services increases the demand for well-planned and cautiously managed wireless local area networks (WLAN) deployment. In WLAN, a station can access services of the network through an access point (AP) after associating with it. Any number of access points can be accessed by the station whose signal strength is available from among the APs. But practically, a WLAN station (STA) always associates with the access point with higher signal strength among the APs. In WLAN, mobile stations continuously change their location, which results in an uneven network load allocation. This uneven load dissemination prompts an extensive performance degradation of WLAN. This paper presents mathematical modeling to characterize the WLAN performance by balancing the network load and enhancing network throughput. Riverbed Modeler simulator was used to investigate the performance parameters as network load and throughput of the network.
APA, Harvard, Vancouver, ISO, and other styles
39

P.H., Latha, and Vasantha R. "MDS-WLAN: Maximal Data Security in WLAN for Resisting Potential Threats." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 4 (August 1, 2015): 859. http://dx.doi.org/10.11591/ijece.v5i4.pp859-868.

Full text
Abstract:
The utmost security standards over Wireless Local Area Network (WLAN) are still an unsolved answer in research community as well as among the commercial users. There are various prior attempts in proposing security of WLAN that lacks focus on access point and is found to be quite complex implementation of cryptography. The proposed paper presents a novel, simple, and yet robust technique called as MDS-WLAN i.e. maximal data security in WLAN. The system is evaluated over laboratory prototype and mitigation measures are drawn for resisting wormhole attack, Sybil attack, and rogue access point issue in WLAN. The outcome of the MDS is compared with conventional AES and SHA that shows optimal communication performance and highest data security.
APA, Harvard, Vancouver, ISO, and other styles
40

Hossain, Md Delowar, Sumon Kumar Debnath, Iffat Ara Badhan, Md Monirul Islam, Ad Ahsan Habib, Md Sharif Uddin, Md Abul Munjer, Prodip Kumar Sarker, Ileas Pramanik, and Mutia Afroze Alin. "Comparative Performance Analysis of the IEEE802.11ax and 802.11ac MIMOLink for WLANs." International Journal on AdHoc Networking Systems 13, no. 4 (October 27, 2023): 01–20. http://dx.doi.org/10.5121/ijans.2023.13401.

Full text
Abstract:
The escalating demand for swift and dependable wireless internet access has spurred the development of various protocols within 802.11 WLANs. Among them, the 802.11ac protocols have gained widespread acceptance over the past few years, offering enhanced data transfer rates compared to the 802.11n standard. However, the persistent congestion of wireless IoT devices, particularly in densely populated areas, remains a significant challenge. To tackle this issue, IEEE 802.11 has advanced IEEE 802.11ax as the successor to 802.11ac, introducing critical enhancements at the PHY/MAC layers to improve throughput in dense scenarios. Additionally, modelling and simulating these protocols are vital for WLAN researchers and designers to anticipate link characteristics effectively, fostering high-performance WLAN design. The need for such tools led to the creation of diverse network simulation programs, and NS-2 is widely accepted as an open-source program that has achieved remarkable success in research. In this paper, we focus on various connection properties of 802.11ax WLANs through NS-3 simulations, including MCSs, bonded channels, GI, data encoding, antennas, data rates, link distance, Tx/Rx power, gain, and payload size. We also compare their performance against 802.11ac, which demonstrates that NS-3 accurately supports most 802.11ax capabilities and outperforms 802.11ac in various scenarios.
APA, Harvard, Vancouver, ISO, and other styles
41

Firdaus, Firdaus, Noor Azurati Ahmad, and Shamsul Sahibuddin. "A Review of Hybrid Indoor Positioning Systems Employing WLAN Fingerprinting and Image Processing." International journal of electrical and computer engineering systems 10, no. 2 (January 15, 2020): 59–72. http://dx.doi.org/10.32985/ijeces.10.2.2.

Full text
Abstract:
Location-based services (LBS) are a significant permissive technology. One of the main components in indoor LBS is the indoor positioning system (IPS). IPS utilizes many existing technologies such as radio frequency, images, acoustic signals, as well as magnetic sensors, thermal sensors, optical sensors, and other sensors that are usually installed in a mobile device. The radio frequency technologies used in IPS are WLAN, Bluetooth, Zig Bee, RFID, frequency modulation, and ultra-wideband. This paper explores studies that have combined WLAN fingerprinting and image processing to build an IPS. The studies on combined WLAN fingerprinting and image processing techniques are divided based on the methods used. The first part explains the studies that have used WLAN fingerprinting to support image positioning. The second part examines works that have used image processing to support WLAN fingerprinting positioning. Then, image processing and WLAN fingerprinting are used in combination to build IPS in the third part. A new concept is proposed at the end for the future development of indoor positioning models based on WLAN fingerprinting and supported by image processing to solve the effect of people presence around users and the user orientation problem.
APA, Harvard, Vancouver, ISO, and other styles
42

Khattak, Sohaib Bin Altaf, Moustafa M. Nasralla, Mohamed Marey, Maged Abdullah Esmail, Min Jia, and Mir Yasir Umair. "WLAN Access Points Channel Assignment Strategy for Indoor Localization Systems in Smart Sustainable Cities." IOP Conference Series: Earth and Environmental Science 1026, no. 1 (May 1, 2022): 012043. http://dx.doi.org/10.1088/1755-1315/1026/1/012043.

Full text
Abstract:
Abstract The idea of smart and sustainable cities is incomplete without using information and communication technologies. Wireless Local Area Network (WLAN) plays a vital role in connecting different services, transferring data and providing indoor localization. WLAN fingerprinting technique has become the most common approach for indoor localization in smart cities. This technique utilizes received signal strength (RSS) and channel status from the installed WLAN Access Points (AP). Currently, WLAN planning relies on the site survey, which is laborious and uneconomical for large areas. The WLAN has a limited number of channels assigned in the frequency reuse strategy. An inefficient channel assignment strategy will lead towards increased interference, thus degrading the overall service. This paper proposes a WLAN channel assignment strategy for large and crowded indoor areas. The proposed scheme assigns the channels to installed APs for indoor localization in fingerprinting framework. The proposed technique ensures that the proposed AP channel assignment algorithm in our network-planning scheme mitigates interference.
APA, Harvard, Vancouver, ISO, and other styles
43

Junirma Buttu. "Analisis Kinerja Jaringan Wlan pada Sekolah Menengah Pertama Negeri 6 Palopo." BANDWIDTH: Journal of Informatics and Computer Engineering 1, no. 1 (January 5, 2023): 20–27. http://dx.doi.org/10.53769/bandwidth.v1i1.380.

Full text
Abstract:
Penelitian ini bertujuan untuk menganalisis kinerja jaringan Wlan dengan Wlan menggunakan aplikasi Axence Nettols, jenis penelitian yang digunakan yaitu metode penelitian kualitatif. Wlan yaitu sebuah jaringan yang dapat melakukan pertukaran data atau sumber daya antar komputer dalam suatu gedung maupun satu area kerja. Untuk mengetahui seberapa besar jaringan Wlan pada Sekolah Menengah Pertama 6 Palopo, maka harus di lakukan analisis kinerja jaringan. Analiasis kenerja jaringan Wlan pada Sekolah Menengah Pertama 6 Palopo menekankan pada proses kecepatan akses dan kapasitas transmisi, dari titik pengirim ke titik penerima yang menjadi tujuan, parameter yang digunakan bandwidth,delay, dan paket loss. Pada analisis ini menghasilkan packet yang dikirim sebanyak 48 packet dan terjadi lost 48 packet sehingga kurang efektif karena apabila terjadi problem administrator tidak akan memperoleh informasi
APA, Harvard, Vancouver, ISO, and other styles
44

Novrianda, Rahmat. "Implementasi authentication Captive Portal pada Wireless Local Area Network PT. Rikku Mitra Sriwijaya." Register: Jurnal Ilmiah Teknologi Sistem Informasi 4, no. 2 (July 1, 2018): 67. http://dx.doi.org/10.26594/register.v4i2.1245.

Full text
Abstract:
PT. Rikku Mitra Sriwijaya merupakan salah satu perusahaan yang menyalurkan tenaga cleaning service. Perusahaan ini telah memiliki Wireless Local Area Network (WLAN) yang digunakan sebagai media pertukaran data serta informasi dengan memanfaatkan media transmisi wireless, WLAN PT. Rikku Mitra Sriwijaya saat ini menggunakan WPA2-PSK sebagai sistem keamanan untuk otentikasi pengguna agar dapat mengakses internet. Akan tetapi, penggunaan WPA2-PSK sebagai keamanan WLAN masih memiliki kelemahan dikarenakan penggunaan 1 password yang sama untuk banyak user agar dapat terhubung dengan hotspot WLAN PT. Rikku Mitra Sriwijaya akan menjadi peluang terjadinya cyber crime. Hal ini terjadi karena akan sangat mudah user yang tidak bertanggung jawab untuk masuk ke dalam WLAN PT. Rikku Mitra Sriwijaya. Dari informasi yang diperoleh, pada tahun 2017 PT. Rikku Mitra Sriwijaya mengalami kehilangan serta perusakan data dan informasi yang dimilikinya. Oleh karena itu, pada penelitian ini akan diterapkan authentication Captive Portal sebagai usaha peningkatan keamanan WLAN PT. Rikku Mitra Sriwijaya menggantikan WPA2-PSK. Proses penelitian ini menggunakan metode Network Development Life Cycle (NDLC), metode ini berorientasi pada network yang memiliki 6 tahapan dengan siklus yang tidak memiliki awal dan akhir. Keseluruhan konfigurasi yang dibutuhkan dalam membangun authentication Captive Portal memanfaatkan program Winbox. Penelitian yang telah dilakukan ini menghasilkan suatu pembatasan otentikasi user khusus bagi user yang telah terdaftar pada WLAN PT. Rikku Mitra Sriwijaya yang diizinkan mengakses internet perusahaan ini. Selain itu, program Winbox juga dapat digunakan untuk monitoring seluruh user yang terhubung ke WLAN PT. Rikku Mitra Sriwijaya, baik user yang sedang aktif maupun yang tidak aktif. PT. Rikku Mitra Sriwijaya is one of the companies that supply cleaning service personnel. This company already has Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, LAN PT. Rikku Mitra Sriwijaya currently uses WPA2-PSK as a security system for authenticate users to be able to access the internet. However, the use of WPA2-PSK as WLAN security still has weaknesses due to the use of the a same password for many users can be connected to the PT. Rikku Mitra Sriwijaya WLAN hotspot will be a chance of occurrence the cyber crime. This happens because it will be very easy for users who are not responsible for enter to WLAN PT. Rikku Mitra Sriwijaya. From the information obtained, in 2017 PT. Rikku Mitra Sriwijaya has lost and damaged their data and information. Therefore, captive portal authentication will be applied in this research as an effort to increase PT. Rikku Mitra Sriwijaya WLAN security that replace WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method, this method is network oriented which has 6 stages with a cycle that has no beginning and ending. The entire configuration needed to build an captive portal authentication utilizes the Winbox program. This research has been carried out resulted limitation for users authentication specifically for users who have registered on PT. Rikku Mitra Sriwijaya WLAN is allowed to access the internet of this company. Furthermore, Winbox program also can be used for monitoring all connected users to PT. Rikku Mitra Sriwijaya WLAN both active and inactive users.
APA, Harvard, Vancouver, ISO, and other styles
45

Sun, Wen Feng, and Ji Zhong Li. "Engineering Design Based on GPON+WLAN." Advanced Materials Research 694-697 (May 2013): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2247.

Full text
Abstract:
Now the existing access networks have not met the requirements of users, especially the increase of wireless access requirement. So the upgrade or reform of the existing access networks becomes very necessary. To begin with, the technology and network structure of GPON and WLAN are introduced in detail, and then how to combine GPON and WLAN in the engineer is also illustrated clearly. According to the common cases in the engineer, two access ways of GPON+WLAN are also shown. Finally, the summary about the GPON+WLAN is discussed in the paper.
APA, Harvard, Vancouver, ISO, and other styles
46

Chruszczyk, Łukasz, Adam Zając, and Damian Grzechca. "Comparison of 2.4 and 5 GHz WLAN Network for Purpose of Indoor and Outdoor Location." International Journal of Electronics and Telecommunications 62, no. 1 (March 1, 2016): 71–79. http://dx.doi.org/10.1515/eletel-2016-0010.

Full text
Abstract:
Abstract This paper presents comparison of prototype location system built with standard components of 2.4 and 5 GHz WLAN network infrastructure. The system can be used for personal or other objects’ positioning, both for indoor and outdoor environments. The system is local, i.e. its operational area is limited to WLAN network operating range. The system is based on standard and widely available WLAN components (access points, network adapters). The goal is to avoid any hardware and software modifications. Also position calculation should not be power hungry operation. Method of location is based in Received Signal Strength Indication (RSSI) returned by most of RF ICs (including WLAN). The main focus is research of how much accuracy (and usefulness) can be expected from standard WLAN hardware. Both static and dynamic scenarios have been tested and compared.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhu, Heng Jun, and Rui Wang. "Analysis of Conflict Resolution Model in Campus WLAN Wireless Network." Advanced Materials Research 989-994 (July 2014): 4590–93. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4590.

Full text
Abstract:
In the campus WLAN wireless networks, transfer speed of network data is attracted great attention of users. How to solve conflict problem occurred in the network data transmission process has become the main goal of the campus WLAN network optimization. This paper presents campus WLAN wireless networks conflict resolution based channel mapping anti-collision algorithm. According to the amount of data to be transmitted in the network, the data length is estimated to provide conflict resolution with support data. On the basis of the channel mapping anti-collision algorithm related theory, conflict resolution model is established. Experimental results show that the proposed algorithm used in resolving conflict in campus WLAN wireless network can reduce the probability of data conflict happened in channel, so as to improve the performance of campus WLAN wireless network.
APA, Harvard, Vancouver, ISO, and other styles
48

Taufikurrahman, Taufikurrahman, Ria Andriani, and Ahmad Sa`di. "PERANCANGAN SISTEM AUTENTIKASI WIRELLESS HOTSPOT BERBASIS RADIUS MENGGUNAKAN MIKROTIK." Journal of Information System Management (JOISM) 4, no. 2 (January 25, 2023): 119–24. http://dx.doi.org/10.24076/joism.2023v4i2.953.

Full text
Abstract:
Penggunaan jaringan WLAN (wireless Local Area Network) pada layanan hotspot sudah menjadi layanan umum yang disediakan oleh pemilik usaha café, toko dan lainya. Terbatasnya pengetahuan jaringan komputer bagi pengelola café memberikan dampak pada keamanan WLAN. Ditemukan banyaknya penggunaan keamanan dasar pada layanan hotspot berdampak adanya isu kekhawatiran bagi pengguna layanan hotspot terhadap keamanan dirinya saat beraktivitas di internet. Penelitian ini bermaksud untuk menguji implementasi sistem autentikasi jaringan WLAN pada layanan hotspot menggunakan network access server dengan memanfaatkan radius server yang telah tersedia di Router Mikrotik dan Radius (Remote Autentication Dial-In User Service) berbasis sumber terbuka yang difungsikan sebagai autentikasi pengguna di jaringan WLAN pada layanan hotspot. Hasil penelitian yaitu implementasi keamanan pada layanan hotspot dengan memanfaatkan radius server dapat menaikkan tingkat pengaman jaringan WLAN (security) tepat guna, dibuktikan setiap pengguna yang akan menggunakan layanan hotspot mengharuskan datang ke petugas barista (dicatat) dan pengguna mengharuskan login dengan akun yang telah tervalidasi serta keamananan awal pengguna dalam menginputkan username dan password telah terenkripsi dengan protocol SSL (Secure Sockets Layer) Kata Kunci : WLAN, Layan Hotspot, Radius, Autentikasi
APA, Harvard, Vancouver, ISO, and other styles
49

Handrizal, Handrizal. "PERBANDINGAN ALGORITMA DSATUR DAN ALGORITMA VERTEX MERGE UNTUK MENENTUKAN CHANNEL WLAN." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 1, no. 1 (July 7, 2017): 14. http://dx.doi.org/10.30645/jurasik.v1i1.4.

Full text
Abstract:
Seiring dengan perkembangan teknologi maka kebutuhan akan ketersedian akses internet melalui wireless lokal area network (WLAN) akan ikut meningkat. Semakin bertambahnya jumlah WLAN maka akan mempengaruhi kualitas dari WLAN itu sendiri, untuk itu diperlukan cara mengatasi masalah tersebut. Algoritma Dsatur dan algoritma Vertex Merge adalah dua buah algoritma yang dapat digunakan untuk membantu masalah diatas. Kedua algoritma ini bekerja berdasarkan konsep pewarnaan graf, setiap vertex dalam graf dianalogikan sebagai akses point dalam WLAN. Hasil penelitian ini menunjukkan bahwa Algoritma Vertex Merge bekerja lebih baik dibandingkan dengan algoritma Dsatur dengan menghasilkan lebih sedikit jumlah channel yang diperlukan.
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Dong Ya. "Security Analysis of 3G-WLAN Fusion." Advanced Materials Research 756-759 (September 2013): 2795–98. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2795.

Full text
Abstract:
With development of wireless Internet, the interworking of the third generation (3G) and wireless Local Area Network (WLAN) has become a focus research. Fusion of 3GWLAN has complementary advantages. The background and scheme of 3G and WLAN Fusion are discussed. The security of Fusion was analysed. Presents two security Fusion schemes has given. The first is called a loose coupling, The second is called close coupling. Two schemes are complement each other, realize the 3G and WLAN user unified management and 3G signing based on user WAPI security mechanism of WLAN access, and protect the user privacy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography