Articles de revues sur le sujet « WIRELESS LAN TECHNOLOGY »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : WIRELESS LAN TECHNOLOGY.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « WIRELESS LAN TECHNOLOGY ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Nakano, Kazumasa. « Wireless LAN Technology for Ship ». Journal of The Japan Institute of Marine Engineering 49, no 5 (2014) : 607–10. http://dx.doi.org/10.5988/jime.49.607.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Banerji, Sourangsu, et Rahul Singha Chowdhury. « On IEEE 802.11 : Wireless Lan Technology ». International Journal of Mobile Network Communications & ; Telematics 3, no 4 (31 août 2013) : 45–64. http://dx.doi.org/10.5121/ijmnct.2013.3405.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Xiang, Z., S. Song, J. Chen, H. Wang, J. Huang et X. Gao. « A wireless LAN-based indoor positioning technology ». IBM Journal of Research and Development 48, no 5.6 (septembre 2004) : 617–26. http://dx.doi.org/10.1147/rd.485.0617.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

She, Xin Ping, et Jian Ming Xu. « Wireless LAN Security Enhancement through Trusted Computing Technology ». Applied Mechanics and Materials 577 (juillet 2014) : 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.

Texte intégral
Résumé :
Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used to improve security status of endpoint. Applying Trusted Computing technology can solve these challenges and enhance WLAN security.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Zhang, Jun Lei, Hui Min Zhang, Cui Min Lian et Rong Li. « Applications of the Wireless LAN Technology in the Nursing Work ». Advanced Engineering Forum 4 (juin 2012) : 19–21. http://dx.doi.org/10.4028/www.scientific.net/aef.4.19.

Texte intégral
Résumé :
With the rapid development of computer network technology, wireless networks have developed to wireless wide area network from a single wireless personal area network. Expansion of coverage was spread from a few meters to a global range and transmission speed was also doubled. The wireless network is gradually used into complicated module network environment, especially in the field of medical treatment, depending on the flexibility and the sound extendibility of its module network. This article is to introduce the wireless LAN technique and its character, and also to express its scientific use in the care.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zeng, Li Li. « Wireless LAN Security Vulnerabilities and Improvement Measures ». Applied Mechanics and Materials 543-547 (mars 2014) : 3335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3335.

Texte intégral
Résumé :
This paper mainly analyzed the security of TKIP protocol and VPN technology ,the wireless LAN 802.11 and 802.1x/EXP security vulnerabilities: defects of SSID and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WEP Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The author put forward improvement authentication and encryption method as improving wireless LAN security measures.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Cheng, Jiujun, Liufei Hu, Junjun Liu, Qingyang Zhang et Chendan Yan. « A New Mechanism for Network Monitoring and Shielding in Wireless LAN ». Mathematical Problems in Engineering 2014 (2014) : 1–8. http://dx.doi.org/10.1155/2014/620926.

Texte intégral
Résumé :
Wireless LAN (WLAN) technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ghadage, Shivani, Swapnali Joshi et Shweta Thorat. « Wi-Fi Technology ». International Journal for Research in Applied Science and Engineering Technology 10, no 12 (31 décembre 2022) : 1068–69. http://dx.doi.org/10.22214/ijraset.2022.48112.

Texte intégral
Résumé :
Abstract: Technology is making rapid progress and is making many things easier. As the innovative thinking of persons is increasing day-by-day, new methods for wireless networking has been evolved of which our Wi-Fi, (Wireless Fidelity) is a trademark that belongs to the Wi-Fi Alliance. It is name commonly used for the standard of wireless (radio) connection that integrates several protocols and is based on a family of IEEE 802.11 standards (Institute of Electrical and Electronic Engineers is an international organization dedicated to the development of standards in electronic technology). The most famous and the most common today is IEEE 802.11g protocol, which determines the operation of wireless networks. Install Wireless LAN was recommended where the deployment of cable system was Wi-Fi, an acronym for Wireless-Fidelity which is the wireless way to handle networking. The main aim of this paper is wireless networking achieved by Wi-Fi. This paper introduces Wi-Fi technology and states the history of this technology in brief. We then deal with the different ways of wireless networking, connecting wi-fi and with wi-fi security. This paper concludes with the pros and cons of this technology and it’s future.
Styles APA, Harvard, Vancouver, ISO, etc.
9

TOKUNAGA, Masashi, Ryoma NISHIMURA et Syunji NAGAMI. « Wireless LAN of Newest Technology in High-Speed Mobile Object ». Journal of The Institute of Electrical Engineers of Japan 127, no 8 (2007) : 545–48. http://dx.doi.org/10.1541/ieejjournal.127.545.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Xiong, Yongping, Ruogu Zhou, Minming Li, Guoliang Xing, Limin Sun et Jian Ma. « ZiFi : Exploiting Cross-Technology Interference Signatures for Wireless LAN Discovery ». IEEE Transactions on Mobile Computing 13, no 11 (novembre 2014) : 2675–88. http://dx.doi.org/10.1109/tmc.2014.2309610.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Jiang, Qing Chao. « Analysis on Wireless LAN Security Issues and Security Implementation ». Advanced Materials Research 1030-1032 (septembre 2014) : 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.

Texte intégral
Résumé :
With the global population of informatization and digitization, network technology is playing a very important role in people's lives. The role of wireless LAN applications is especially significant. People's daily lives and work are no longer confined to paper or wired connection, but gradually extend to the use of radio. Although it brought a lot of convenience to people's lives, wireless LAN security problems also frequently occurred. This paper mainly aims to analyze the security risk and at the same time offer some preventive measures.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Antero, Ganner, Abdul Rasyid et Martono Dwi Atmadja. « Analisis Kinerja Wireless Access Point Menggunakan Wifi Monitoring Tools Berbasis Raspberry Pi 3 ». Jurnal Jartel Jurnal Jaringan Telekomunikasi 11, no 4 (30 décembre 2021) : 167–74. http://dx.doi.org/10.33795/jartel.v11i4.245.

Texte intégral
Résumé :
Komputer mini sekarang cukup maju hingga dapat dimanfaatkan dalam berbagai bidang. Salah satu komputer mini yang banyak digunakan adalah Raspberry Pi 3. Raspberry Pi 3 adalah salah satu komputer mini yang memiliki fitur berupa wireless LAN. Fitur wireless LAN pada komputer mini dapat dimanfaatkan sebagai Wireless Access Point. Sehingga Raspberry Pi 3 dapat menjadi alternatif Wireless Access Point. Namun komputer mini mempunyai kemampuan yang berbeda dengan Wireless Access Point pada umumnya karena mempunyai spesifikasi yang berbeda. Tujuan dari penelitian ini adalah untuk mengetahui kinerja dari Wireless Access Point yang berbasis Raspberry Pi 3. Raspberry Pi 3 dihubungkan dengan laptop yang sudah terhubung dengan internet melalui kabel LAN dengan tujuan agar Raspberry Pi 3 dapat terhubung ke internet. Raspberry Pi 3 dikonfigurasikan sebagai Wireless Access Point (WAP) dan diprogram untuk pengambilan data dan monitoring yang berupa trafik dan informasi user yang ditampilkan dalam tampilan web. Pada penelitian ini telah dilakukan pengujian Raspberry Pi 3 sebagai Wireless Access Point. Kemampuan Raspberry Pi 3 sebagai Wireless Access Point sangat dipengaruhi oleh trafik yang dilakukan oleh user. Menurut hasil pengujian Raspberry Pi 3 sebagai Wireless Access Point memiliki batas maksimum user sejumlah 13 dengan beban trafik yang tinggi, 17 user dengan beban yang sedang dan 27 dengan beban yang rendah. Hal ini menunjukkan bahwa Raspberry Pi 3 layak digunakan sebagai Wireless Access point dalam skala kecil.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Asep Supriadi, Hendra Supendar et Sulistianto Sutrisno Wanda. « MANAJEMEN KEBIJAKAN JARINGAN NIRKABEL MENGGUNAKAN CLOUDPATH ENROLLMENT SYSTEM DENGAN METODE RADIUS ». Jurnal Teknik Informatika dan Teknologi Informasi 2, no 1 (17 août 2022) : 17–33. http://dx.doi.org/10.55606/jutiti.v2i1.338.

Texte intégral
Résumé :
ABSTRAK Many ways are used to make communication easier, One of the most notable changes to computer network communication technology is the use of wireless technology. The technology applied to this computer network is commonly called WLAN (Wireless LAN). WLAN is a local network of wireless areas that uses radio waves as a transmission medium. The conveniences contained in this technology are the triggers for choosing the use of technology in computer networks. Of all the conveniences offered by wireless, there is a weakness in the application of this technology, namely the security side, which still has many loopholes to be attacked by other parties. Many unauthorized clients can access hotspots, if this happens, it will directly or indirectly harm the ISP (Internet Service Provider). By implementing the Ruckus Cloudpath Application configuration and the use of RADIUS features on the user side. Based on the results of research, the best security system at this time uses the WPA RADIUS (Wireless Protection Autentication Remote Authentication Dial in User Services) method. Keywords: Wireless, Cloudpath, RADIUS. Banyak cara yang digunakan untuk membuat komunikasi semakin mudah, Salah satu perubahan paling menonjol pada teknologi komunikasi jaringan komputer adalah penggunaan teknologi wireless. Teknologi yang diterapkan pada jaringan komputer ini biasa disebut WLAN (Wireless LAN). WLAN adalah suatu jaringan lokal area tanpa kabel yang menggunakan gelombang radio sebagai media tranmisinya. Kemudahan-kemudahan yang terdapat pada teknologi ini yang menjadi pemicu pemilihan penggunaan teknologi pada jaringan komputer. Dari semua kemudahan-kemudahan yang ditawarkan wireless ini terdapat suatu kelemahan dalam penerapan teknologi ini yaitu sisi keamanan yang masih banyak terdapat celah untuk diserang oleh pihak-pihak lain. Banyak client yang tidak sah dapat mengakses hotspot, jika sampai hal ini terjadi maka secara langsung atau tidak langsung akan merugikan pihak ISP (Internet Servis Provider). Dengan menerapkan konfigurasi Aplikasi Ruckus Cloudpath dan penggunaan fitur RADIUS di sisi pengguna. Berdasarkan hasil penelitian sistem keamanan terbaik pada saat ini menggunakan metode WPA RADIUS (Wireless Protection Autentication Remote Authentication Dial in User Services). Kata Kunci: Wireless, Cloudpath, RADIUS.
Styles APA, Harvard, Vancouver, ISO, etc.
14

MIWA, Takashi, Nobukazu WAKABAYASHI et Yoshiji YANO. « Constructing shipboard LAN system using wireless LAN technology and its Application to the ship monitoring system ». Journal of Japan Institute of Navigation 114 (2006) : 243–50. http://dx.doi.org/10.9749/jin.114.243.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Takatori, Yasushi, Yusuke Asai et Yasuhiko Inoue. « 7. MIMO Technologies in Wireless LAN Systems ». Journal of the Institute of Image Information and Television Engineers 70, no 1 (2016) : 35–40. http://dx.doi.org/10.3169/itej.70.35.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kubota, Shuji. « 5. Forward Error Correction of Wireless LAN ». Journal of The Institute of Image Information and Television Engineers 70, no 9 (2016) : 764–69. http://dx.doi.org/10.3169/itej.70.764.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Woo, Jong-Jung, et Su-Goog Shon. « Development of the Embedded Wireless LAN Technology for Power Utility Equipments ». Journal of the Korean Institute of Illuminating and Electrical Installation Engineers 20, no 10 (31 décembre 2006) : 126–34. http://dx.doi.org/10.5207/jieie.2006.20.10.126.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Emilselvan, G. s. r., N. Gayathri, S. Rakesh Kumar, Ankush Rai et Jagadeesh Kannan R. « ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN ». Asian Journal of Pharmaceutical and Clinical Research 10, no 13 (1 avril 2017) : 441. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19987.

Texte intégral
Résumé :
Wireless networking technology is becoming increasingly popular but, at the same time, has introduced many security issues. WEP standards are followed in WLANs for providing security. But WEP is fatally crippled by the fact that WEP keys are the same for all users, all sessions and never changes and its poor implementation of the RC4 encryption scheme. The authentication mechanism is based on a simple challenge-response protocol. The main problem with the previously used method was same key was used for both encryption and authentication. But the proposed authentication is by means of certificates using Extensible Authentication Protocol and a session key is transferred after successful authentication between mobile node and server. This session key is then used for encrypting messages using Advanced Encryption Standard between mobile node and server.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Gao, Xiao Yan. « Design of the Wireless Communications System in the Nuclear Power Plants ». Applied Mechanics and Materials 494-495 (février 2014) : 1902–5. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1902.

Texte intégral
Résumé :
With the development of wireless network technology, wireless communication is widely used in entertainment, business, factory and other fields. But, for those nuclear power plants which are currently in service, wireless technology did not get fully used, some even in unused condition. Actually, wireless communication system can be used to provide wireless connection between computer and mobile/portable devices, and provide access to LAN system; it also can be used to transmit video and data for cameras and sensors; it can realize wireless expansion of MAIN PABX system, so to meet all kinds of Wireless communication requirements in Nuclear Power Station.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Jostschulte, K., R. Kays et W. Endemann. « Enhancement of wireless LAN for multimedia home networking ». IEEE Transactions on Consumer Electronics 51, no 1 (février 2005) : 80–86. http://dx.doi.org/10.1109/tce.2005.1405703.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Li, Zhi Min, De Han Luo, Dan Jun Fan et Chao Wang. « Design and Realization of Wireless LAN in Smart Home System Based on 433MHZ Communication ». Applied Mechanics and Materials 336-338 (juillet 2013) : 1645–49. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1645.

Texte intégral
Résumé :
Nowadays, wireless network technology in smart home is rapid gaining popularity duo to its flexible integration into everyday life. The paper introduces a method that adopts 433MHZ communication to establish the wireless network in smart home system based on Si4421 wireless modules. The paper designed the overall idea of how to establish the wireless network, it mainly talk about the wireless module, including both software and hardware. The difficulty lies in the realization of the custom wireless communication protocol. The Si4421 wireless module was tested in data communication and control in smart home system which can work efficiently and reliably, it proved that the wireless module is perfectly suitable for the wireless network construction in smart home with small size package, low consumption, low cost, and strong ability to leap obstacles.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Hu, Shi Yang, Sheng Cheng Zhang et De Ze Qin. « The Design and Application of Wireless Network Based on Digital Campus ». Advanced Materials Research 1078 (décembre 2014) : 337–40. http://dx.doi.org/10.4028/www.scientific.net/amr.1078.337.

Texte intégral
Résumé :
With the rapid development of society, universities also develop its digital, intelligent business, which gradually increases the network data transmission needs. Wireless networks are an important part of the campus network, it is very important to build the campus wireless network as a supplement to a campus network. This design introduces a wireless network technology, and uses He Zhou College West Campus as a platform to design the campus wireless LAN-building program. The wired network and wireless network combine to provide better conditions for the campus information technology.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Sarmah, S., S. K. Sarma et M. Rahman. « An Intelligent Method for Bandwidth Utilization in IEEE 802.11e Wireless LAN ». International Journal of Recent Technology and Engineering 9, no 5 (30 janvier 2021) : 172–77. http://dx.doi.org/10.35940/ijrte.e5230.019521.

Texte intégral
Résumé :
IEEE 802.11 Wireless LAN, popularly known as WiFi, has become the admired source of internet connectivity for most of the offices as well as organizations. Due to the rapid growth of multimedia data and VoIP and also to provide better quality of service (QoS), bandwidth and management of bandwidth have become important factors in 802.11 wireless LAN. In 802.11 wireless LAN, Enhanced Distributed Coordination Access (EDCA) mechanism provides QoS with service differentiation by setting different priority to different traffic types. Some of the available methods provide priority based on user category also. In this paper we have proposed an intelligent bandwidth management technique based on the user priority value, traffic priority value and the bandwidth requirement value. By combining these three values, a new metric called request weight value is calculated. Based on this request weight value, dynamically bandwidth is allocated to the users. From the simulation results, we have seen that the proposed method performs well in proper utilization of bandwidth among the available users.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Jae-Young Pyun, Yoon Kim, Kyung Hun Jang, Jong Ae Park et Sung-Jea Ko. « Wireless measurement based resource allocation for QoS provisioning over IEEE 802.11 wireless LAN ». IEEE Transactions on Consumer Electronics 49, no 3 (août 2003) : 614–20. http://dx.doi.org/10.1109/tce.2003.1233784.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Lee, Il-Gu, Kyungmin Go et Jung Hoon Lee. « Battery Draining Attack and Defense against Power Saving Wireless LAN Devices ». Sensors 20, no 7 (5 avril 2020) : 2043. http://dx.doi.org/10.3390/s20072043.

Texte intégral
Résumé :
Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Cavalieri, S., et D. Panno. « A novel solution to interconnect FieldBus systems using IEEE wireless LAN technology ». Computer Standards & ; Interfaces 20, no 1 (novembre 1998) : 9–23. http://dx.doi.org/10.1016/s0920-5489(98)00013-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Tarmizi, Achmad Rian, Ahmat Adil et Lilik Widyawati. « Optimization Of The Use Of Wireless Lan Devices To Minimize Operational Costs ». MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 19, no 2 (30 mai 2020) : 195–206. http://dx.doi.org/10.30812/matrik.v19i2.665.

Texte intégral
Résumé :
WLAN technology has been widely developed for the needs of internet access in people's lives. Several generations of WLAN technology include IEEE 802.11b, IEEE 802.11a, IEEE 802.11g and IEEE 802.11n. At the STAHN Rectorate Building, Gde Pudja Mataram, WLAN technology in its application requires financial consideration because excessive use of Internet Service Provider services results in a waste of operational costs. The application of WLAN is still not optimal, because there are not too many users, but the operational costs of implementing the local wireless network are very large, due to less optimal application of network infrastructure. The recommended WLAN technology is IEEE 802.11n, while the technology is the latest technology that has better quality than the previous generation technology. The research methodology uses the Network Development Life Cycle (NDLC). Of the 6 stages available, only 3 stages are used, namely Analysis, Design and Simulation of Prototyping. The results obtained from this study are models that design a WLAN that suits your needs, and complements the entire Building area. Optimization has succeeded in reducing the need for ISP and client services while still being able to enjoy services as needed and cost optimization can be reduced by around 28%.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Ma, Jin Jin, Guang Jin, Xian Liang Jiang, Lu Juan Huang et Xian Mang He. « On the Wireless Network Curriculum Teaching ». Applied Mechanics and Materials 378 (août 2013) : 514–19. http://dx.doi.org/10.4028/www.scientific.net/amm.378.514.

Texte intégral
Résumé :
Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT major, the computer network curriculum mainly focuses on the wired networks rather than the wireless networks and is hard to meet the needs of IT industry. In this paper, we firstly survey the current teaching of wireless network techniques and then discuss the necessity of the wireless network curriculums. By improving teaching contents and methods, we put forward a novel wireless network teaching mode using simulation tools.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Jamalipour, A., et S. Valaee. « Toward seamless internetworking of wireless lan and cellular networks - Guest Editorial ». IEEE Wireless Communications 12, no 3 (juin 2005) : 6–7. http://dx.doi.org/10.1109/mwc.2005.1452849.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Cao, Xu Hui, Cai Wu Lu et Yu Ji Li. « WI-FI in Mine Ventilation Monitoring System ». Advanced Materials Research 591-593 (novembre 2012) : 1835–38. http://dx.doi.org/10.4028/www.scientific.net/amr.591-593.1835.

Texte intégral
Résumé :
WI-FI is currently a popular wireless LAN technology, with access to high speed, large coverage area and so on. WI-FI has its flexibility and mobility, more and more attention, showing great prospects. This article describes the characteristics and advantages of WI-FI technology, combined with the actual situation of a WI-FI based wireless sensor technology and monitoring system for the implementation of the mine ventilation plan, and the program specific application in the monitoring system has been described, the program has proved flexible, simple wiring, has certain application value.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Djuraev, Sirojiddin, et Seung Yeob Nam. « Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness ». Electronics 9, no 11 (22 octobre 2020) : 1749. http://dx.doi.org/10.3390/electronics9111749.

Texte intégral
Résumé :
Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where attackers send malicious messages or signal on a legitimate channel by causing intentional interference in the network. In order to avoid jamming attacks, various jamming defense schemes have been proposed. One of the popular methods is a channel-hopping scheme. However, the main challenge of this method is generating a common channel number between the users and the access point without leaking that information to the jammer. We propose a new channel-hopping scheme where the access point shares a separate key with each user to isolate the damage on the network when a key has been compromised, while maintaining high throughput and fairness. We evaluate the proposed scheme through experiment on a test bed.
Styles APA, Harvard, Vancouver, ISO, etc.
32

P, Senthilkumar, et Baskar M. « A study on mobile ad-hock networks (manets) ». Journal of Management and Science 1, no 1 (30 juin 2011) : 14–20. http://dx.doi.org/10.26524/jms.2011.3.

Texte intégral
Résumé :
As we know that wireless technology becomes very famous among all the aspects of different technologies of computer networking of present era, the Wireless networks really provide the convenient and easy approach to communications between different areas. Wi-Fi is commonly called as wireless LAN, it is one of those networks in which high frequency radio waves are required for transmission of data from one place to another. Wi-Fi operates on several hundred feet between two places of data transmission. This technology only works on high frequency radio signals. Nowadays this technology is used as office or home network and in many electronic devices. Wireless LAN or Wi-Fi is divided into three main parts on which its whole working depends and all of its applicationsdepend on these parts such as infrastructure mode and ad hoc mode of networking. However, the important type that plays a vital role almost in application is the Ad Hoc mode of networking.This type of networking is also commonly called as peer-to-peer networking or P2P networking. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. There is still ongoing research on mobile ad hoc networks and the research may leadto even better protocols and will probably face new challenges. The current goal is to find an optimal balance between scalable routing and media access control, security, and service management.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Sun-Wook Kim et Kyun Hyon Tchah. « Performance analysis of adaptive equalizer design for OFDM wireless LAN ». IEEE Transactions on Consumer Electronics 50, no 2 (mai 2004) : 512–16. http://dx.doi.org/10.1109/tce.2004.1309416.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Cunningham, G., P. Perry, J. Murphy et L. Murphy. « Seamless Handover of IPTV Streams in a Wireless LAN Network ». IEEE Transactions on Broadcasting 55, no 4 (décembre 2009) : 796–801. http://dx.doi.org/10.1109/tbc.2009.2030466.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Li, Chunmei, Bin Li et Guohong Shi. « Design of Electronic Remote Control System Based on Wireless Sensor ». International Journal of Online Engineering (iJOE) 13, no 05 (14 mai 2017) : 146. http://dx.doi.org/10.3991/ijoe.v13i05.7057.

Texte intégral
Résumé :
<p class="0abstract">A wireless remote sensing system based on wireless sensor network solution is proposed, to achieve the remote control of home appliances. The remote control system uses STM32F103 chip as the main controller of the smart home system, and applies the CC1110 radio frequency module as the communication node of the home wireless sensor network. Through the Simplici TI network protocol, these nodes together are put forward to form a small home LAN. Then, combining with GPRS wireless communication technology and Web Internet technology, these nodes to the remote server are collected. The results showed that through the user's mobile terminal access, it can form a wireless remote monitoring system. The conclusion is drawn that an intelligent home remote monitoring system based on wireless sensor network is feasible and it has good performances.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
36

Abdul Malik, Mohd Mirza, Mohd Nizam Osman et Mushahadah Maghribi. « Monitoring and Evaluating Open Wireless LAN using Hybrid IDS ». Journal of Computing Research and Innovation 4, no 2 (14 novembre 2019) : 60–67. http://dx.doi.org/10.24191/jcrinn.v4i2.118.

Texte intégral
Résumé :
In this ever-growing wireless technology era, the number of Open Wireless Local Area Network (WLAN) are on the rise. From cafes to shopping areas, most of them offer users with a free-to-use WLAN which popularly known as Open Wi-Fi or Wi-Fi Hotspots. Although it is a convenient for them to access the Internet at these places, later they know it also makes them a vulnerable target for attackers that might be lurking in the same network they are connected. Therefore, a Hybrid IDS that combines both SNORT, a network-based IDS (NIDS) and OSSEC, a host-based IDS (HIDS) was developed to curb the problem. NIDS was used to monitor network traffics while HIDS monitor user’s system for any suspicious activities. Then, a system that can control and manage both IDS in the much easier and simpler way was developed using Python programming language. The system then can generate alerts with the help of both IDS to notify users for any suspicious activities that might occur in the network or user’s system. Several attacks were launched from the attacker’s laptop to test whether Hybrid IDS can generate alerts to notify the victim. As a result, the system breeze through the testing phase by showing necessary output. All the results were taken and then compared with other scenarios to determine whether they can give the same results as Hybrid IDS. From the comparison results, it can be said that Hybrid IDS can give the extra protection layer towards Open Wi-Fi users. Therefore, the Hybrid IDS was proven to provide vast tracking detection for suspicious activity in the network environments by monitor and alert the users about malicious activities.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Huang, Qing Fu, Jian Wu Yang et Zhi Cheng Chen. « The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01 ». Advanced Materials Research 271-273 (juillet 2011) : 991–94. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.991.

Texte intégral
Résumé :
With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Haryanto, Dedi. « PERANCANGAN JARINGAN WIRELESS ACCESS POINT UNTUK MENJADIKAN BISNIS UMKM NADINASALIM MENGGUNAKAN PACKET TRACER DENGAN METODE PENGEMBANGAN Network Development Life Cycle (NDLC) ». Jusikom : Jurnal Sistem Komputer Musirawas 7, no 1 (1 juin 2022) : 53–60. http://dx.doi.org/10.32767/jusikom.v7i1.1594.

Texte intégral
Résumé :
Penggunaan pada suatu jaringan komputer selama beberapa dekade.yang telah di gunakan untuk saling berhubungan dalam proses bisnis di prusahaan, perguruan tinggi, anatr kota, ataupun antar suatu.wilayah.-Pada awalnya,jaringan komputer mengunakan kabel untuk-saling;berhubungan, namun.perlahan hal ini berubah menuju ke arah pemakaianpada jaringan nirkabel.,Pada Applikasi jaringan nirkabel ini dapat memberikan dampak dalam proses perubahan yang cukup signifikan yang dapat memungkinkan untuk orang-orang yang dapat .bisa memperluas dalam,ruang lingkup kerja mereka yang dikarenakan tidak berkaitan, pada kabel. M.Setiawan hidayat (2009). menjelaskan bahwa banyak benefit yang nyata dari beberapa .penggunaan pada jaringan wireless, terutama pada berkaitan dengan masalah yang terdapat pada suatu jaringan kabel. Salah satu benefit dari penggunaan jaringan wireless adalah relatif-tidak adanya batasan jarak. Biasanya.kabel harus dipasang mengikuti bentuk dinding, melintasi-lantai-dan-lain-lain.-Metode.penelitian.ini-menggunakan metode Network Development Life Cycle (NDCL),untuk dapat merancang-suatu-jaringan dengan menggunakan konfigurasi access point.yang dapat memudahkan untuk mengirimkan data dan mempercepat suatu koneksi serta access.point tersebut dapat menghubungkan suatu jaringan lokal dengan jaringan nirkabel. Jaringan wireless meniadakan hal ini karena bersipat line of sight. Wireless Local Area Network (WLAN) berfungsi untuk menjangkau wilayah LAN yang sulit dicapai dengan kabel dan juga untuk menjangkau pengguna bergerak (mobile user) serta dpat mengeliminasi atau dapat memilih penggunaan kabel yang dapat cukup mengganggu dalam kerumitan instalisasi dalam menghubungkan lebih dari satu komputer maupun pengguna bergerak(mobile user).
Styles APA, Harvard, Vancouver, ISO, etc.
39

Abbasov, Е. М. « Indicators of wireless technologies for monitoring the quality and management ». Informacionno-technologicheskij vestnik 11, no 1 (30 mars 2017) : 14–24. http://dx.doi.org/10.21499/2409-1650-2017-1-14-24.

Texte intégral
Résumé :
The problems of integration of the various wireless technologies, for-consists in the provision of required transmission speed and the transmission of information over a considerable distance at low power sensor nodes transmitters wireless Internet-water network for remote monitoring. Analyzed the integration of wireless LAN standard IEEE 802.11n/g and Bluetooth. Determined Graphic analytical dependence-dence, the defining characteristics of the data rate for wireless IEEE 802.11n / g networks. It analyzes the main shortcomings of BSS associated with ef cient use of batteries; the basic Metody reduce energy consumption for WSN based on the ZigBee technology, based on the planning schemes of awakening and data collection schemes. The possibilities MeshLogic technology solutions for the monitoring and control tasks that are critical to BPE-autonomous work Meni sensors.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Huang, Li Hua, Xi En Ye et Xin Jun Shi. « The Design and Application of WiFi-Smart Socket in Smart Home ». Advanced Materials Research 902 (février 2014) : 274–79. http://dx.doi.org/10.4028/www.scientific.net/amr.902.274.

Texte intégral
Résumé :
Smart home system mainly consists of home networking, home wireless LAN and the external network components. It will achieve the intelligentize and informatization of the home furnishing. Smart socket is one of which belongs to the smart home terminal devices. This article is to talk about smart socket. The core chips of this system are Texas Instruments CC3000MOD and MSP430FR5739MCU. Using WiFi wireless communications technology control and process signals coming from the side of the handheld PDA. Controller side can support two software platforms IAR or CCS. This design uses IAR workbench. PDA client software using the Android operating system is used to receive and process analog signals from controller side. In this paper, WiFi wireless transmission technology as the basis, based on IEEE802.11b/g wireless protocol, It achieves a WiFi wireless communication system for remote or local client and terminal equipment, enabling the intelligent control of the home furnishing.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Farnham, Tim, Mahesh Sooriyabandara et Costas Efthymiou. « Enhancing multimedia streaming over existing wireless LAN technology using the Unified Link Layer API ». International Journal of Network Management 17, no 5 (2007) : 331–46. http://dx.doi.org/10.1002/nem.667.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Asaf, Khizra, Bilal Khan et Ga-Young Kim. « Wireless Lan Performance Enhancement Using Double Deep Q-Networks ». Applied Sciences 12, no 9 (20 avril 2022) : 4145. http://dx.doi.org/10.3390/app12094145.

Texte intégral
Résumé :
Due to the exponential growth in the use of Wi-Fi networks, it is necessary to study its usage pattern in dense environments for which the legacy IEEE 802.11 MAC (Medium Access Control) protocol was not specially designed. Although 802.11ax aims to improve Wi-Fi performance in dense scenarios due to modifications in the physical layer (PHY), however, MAC layer operations remain unchanged, and are not capable enough to provide stable performance in dense scenarios. Potential applications of Deep Learning (DL) to Media Access Control (MAC) layer of WLAN has now been recognized due to their unique features. Deep Reinforcement Learning (DRL) is a technique focused on behavioral sensitivity and control philosophy. In this paper, we have proposed an algorithm for setting optimal contention window (CW) under different network conditions called DRL-based Contention Window Optimization (DCWO). The proposed algorithm operates in three steps. In the initial step, Wi-Fi is being controlled by the 802.11 standards. In the second step, the agent makes the decisions concerning the value of CW after the TRAIN procedure for the proposed algorithm. The final phase begins after the training, defined by a time duration specified by the user. Now, the agent is fully trained, and no updates will be no longer received. Now the CW is updated via the OPTIMIZE process of DCWO. We have selected total network throughput, instantaneous network throughput, fairness index, and cumulative reward, and compared our proposed scheme DCWO with the Centralized Contention window Optimization with DRL (CCOD). Simulation results show that DCWO with Double Deep Q-Networks (DDQN) performs better than CCOD with (i) Deep Deterministic Policy Gradient (DDPG) and (ii) Deep Q-Network (DQN). More specifically, DCWO with DDQN gives on average 28% and 23% higher network throughput than CCOD in static and dynamic scenarios. Whereas in terms of instantaneous network throughput DCWO gives around 10% better results than the CCOD. DCWO achieves almost near to optimal fairness in static scenarios and better than DQN and DDPG with CCOD in dynamic scenarios. Similarly, while the cumulative reward achieved by DCWO is almost the same with CCOD with DDPG, the uptrend of DCWO is still encouraging.
Styles APA, Harvard, Vancouver, ISO, etc.
43

B., Manjula, Devendra Kumar et Rani Medhashree. « Implementation of Virtual WLAN Using Transformerless Power Convertors ». INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no 2 (15 avril 2018) : 38–40. http://dx.doi.org/10.35121/ijapie201804227.

Texte intégral
Résumé :
Today, Wireless communication is so vital in the field of science and technology. Research regarding these capabilities suggests that Wireless LANs. Virtualization of the wireless network interface, which means using a single wireless network interface to connect to more than one network simultaneously. This paper provides an introductory study for the Creation of a virtual WLAN controller that will implement many of the configuration functions currently running on several Wireless Access point to a centralized box. This will allow seamless management of large numbers of such access points running different hardware to be seamlessly managed. The firmware running on the access point will an OpenWRT open source solution that will use CAPWAP protocol to communicate with the virtual LAN controller.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Ali, Adnan Hussein, Alaa Desher Farhood et Maham Kamil Naji. « Analysis of a framework implementation of the transceiver performances for integrating optical technologies and wireless LAN based on OFDM-RoF ». International Journal of Electrical and Computer Engineering (IJECE) 10, no 4 (1 août 2020) : 4252. http://dx.doi.org/10.11591/ijece.v10i4.pp4252-4260.

Texte intégral
Résumé :
The greatest advantages of optical fibers are the possibility of extending data rate transmission and propagation distances. Being a multi-carrier technique, the orthogonal frequency division multiplexing (OFDM) can be applicable in hybrid optical-wireless systems design owing to its best spectral efficiency for the interferences of radio frequency (RF) and minor multi-path distortion. An optical OFDM-RoF-based wireless local area network (W-LAN) system has been studied and evaluated in this work. The outline for integrating an optical technology and wireless in a single system was provided with the existence of OFDM-RoF technology and the microstrip patch antenna; these were applied in the Optisystem communication tool. The design of the proposed OFDM-RoF system is aimed at supporting mm-wave services and multi-standard operations. The proposed system can operate on different RF bands using different modulation schemes like 4,16 and 64QAM, that may be associated to OFDM and multidata rates up to 5 Gbps. The results demonstrate the robustness of the integrated optical wireless link in propagating OFDM-RoF-based WLAN signals across optical fibers.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Kennedy, Janero, et Soleh Nur Rohman. « PERANCANGAN JARINGAN WIRELESS LAN DENGAN MENGGUNAKAN ROUTER OS MIKROTIK PADA SEKOLAH DASAR NEGERI PAHONJEAN 01 ». Jurnal Teknologi dan Bisnis 1, no 1 (20 décembre 2019) : 103–13. http://dx.doi.org/10.37087/jtb.v1i1.59.

Texte intégral
Résumé :
The background is a problem that occurs in al-Ittihad elementary school which causes the author to take the title of this thesis. . Around the Al-Ittihad Elementary School, the network signal from ISP providers, both GSM and CDMA, is not very good so that the data access received is not optimal. This is based on the author's own experience using GSM modems, surveys and interviews with teachers and school staff at Al-Ittihad Elementary School. Also faced with the fact that the high tariff for unlimited data access from the service provider PT. Telkom (speedy) made the author look for a solution, is there another way that is cheaper and simpler to be able to use the internet easily in the scope of this al-Ittihad elementary school comfortably, safely without having to worry about banned sites. The purpose and objective of the research is to first recognize and understand further computer network technology, especially wireless/wireless (wireless) networks. Both members make it easy for users to access the internet. Third, knowing the technique of making / building an infrastructure and implementation. Fourth, get to know information technology in the al-Ittihad elementary school environment. The research method is the method used by the author in the preparation of this thesis. The author uses methods and techniques to compile and present appropriate and accurate information. Therefore, appropriate methods and techniques are needed to obtain valid and accountable data. The method used by the author is as follows, the first research location. Second Collecting data and third Designing. Implementation is discussing how to install and configure the devices used in designing the WLAN network at the Al-Ittihad elementary school in Cilacap with Mikrotik. The output or results achieved in the design of this WLAN (Wireless Local Area Network) is to provide convenience for teachers, students and school visitors in accessing the internet, accessing the internet is not only in the school room but can also be accessed around the school environment via a wireless network. and does not require a data cable so that it is more efficient and effective.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Yang, Hui Ying, Xiao Hua Sun, Yan Zhao et Fu Shun Wang. « The Medical Infusion Alarm System Based on the Smart Phone Platform ». Advanced Materials Research 765-767 (septembre 2013) : 1146–50. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1146.

Texte intégral
Résumé :
Using the Windows Phone 7.5 smart phones as platform and the Silverlight technology designed and developed a set of complete infusion alarm system. With its own wireless Wi-Fi capabilities, through the hospital's wireless LAN access patient information, the smart phone can carry, solved the problem of the past that medical staff must stay in front of the computer, it can understand infusion information at any time, in time to tackle the problem of infusion and get the alarm information, and improves the work efficiency of medical personnel.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Zhang, Ke, Yu Cao, Chang Fu Li et Wei Ye Liu. « The Simulation of DS-UWB RAKE Receiver over the Multipath Channel ». Advanced Materials Research 989-994 (juillet 2014) : 3868–71. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.3868.

Texte intégral
Résumé :
Ultra-Wideband (UWB) wireless communication is a new potential communication technology currently in its field. It becomes very popular in the world since it’s high performance, low radicalization and low cost. Currently UWB wireless system, we can call it Impulse Radio technology too, be invented in 20 century 1960s. But it was only used in military affairs field, bailout searching, radar location and so on. After civil using, it usually is used in indoor wireless LAN .In this paper, the development and application of UWB are introduced, the characteristic and limitation of UWB are simply analyzed. According to the simulating depending on Multipath channel, it shows increasing SNR about 1.5dB to the base of primary power district or increasing SNR about 1dB to primary power district and minor power district, we can get whole performance of RAKE receiver in perfect channel.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Heejung Yu, Myung-Soon Kim, Eun-young Choi, Taehyun Jeon et Sok-kyu Lee. « Design and prototype development of MIMO-OFDM for next generation wireless LAN ». IEEE Transactions on Consumer Electronics 51, no 4 (novembre 2005) : 1134–42. http://dx.doi.org/10.1109/tce.2005.1561835.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Hundt, O., R. Kays, B. Aznar, W. Endemann et C. Schilling. « Methods to Improve the Efficiency of Wireless LAN for Multimedia Home Networks ». IEEE Transactions on Consumer Electronics 53, no 2 (2007) : 397–404. http://dx.doi.org/10.1109/tce.2007.381707.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Kim, Hyerin, et Jungmin So. « Improving Spatial Reuse of Wireless LAN Uplink Using BSS Color and Proximity Information ». Applied Sciences 11, no 22 (22 novembre 2021) : 11074. http://dx.doi.org/10.3390/app112211074.

Texte intégral
Résumé :
With the density of wireless networks increasing rapidly, one of the major goals in next-generation wireless LANs (Local Area Networks) is to support a very dense network with a large number of closely deployed APs (Access Points) and crowded users. However, the CSMA (Carrier-Sense Multiple Access)-based medium access control of current wireless network systems suffers from significantly degraded performance when the network becomes dense. Recent WLAN (Wireless Local Area Networks) standards include measures for increasing spatial reuse such as BSS (Basic Service Set) coloring, but the schemes based on BSS coloring such as OBSS/PD (Overlapping BSS/Preamble Detection) have limitations in improving spatial reuse. In this paper, we propose a spatial reuse method for uplink which can utilize BSS color and proximity information to improve the efficiency of carrier sensing and thus spatial reuse. Specifically, through the BSS color and the proximity information, a node receiving a preamble can figure out how far the receiver of the ongoing traffic is located. This information is used to determine whether the node should aggressively start transmitting or defer its transmission to protect the ongoing transmission. Simulation results show that the proposed method outperforms existing methods in terms of throughput and fairness.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie