Gotowa bibliografia na temat „Network Stumbler software”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Network Stumbler software”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Network Stumbler software"

1

Emagbetere, J. O., i F. O. Edeko. "Investigation of the Characteristics of Radio Signal Propagation in Indoor Environment". Advanced Materials Research 62-64 (luty 2009): 166–71. http://dx.doi.org/10.4028/www.scientific.net/amr.62-64.166.

Pełny tekst źródła
Streszczenie:
The success of wireless local area networks (WLANs) has led to an intense interest among wireless engineers in understanding and predicting radio propagation characteristics within buildings. This paper present radio signal propagation measurement and modeling at 2.4GHz, within a building in the Faculty of Engineering, University of Benin. A base station built around SENAO access point, and a PA24 flat panel directional antenna of 19dBi gain and 17.50 beam-widths was setup for the experimentation. Signals were monitored from the fixed BS using LINKSYS, and NET STUMBLER version 4.0 software run on a Laptop. In this report, the effect of multi-path and delay spread was not considered. The result of the investigation revealed a significant attenuation of the radio signal within the small distance. A path loss exponent of 7.8 to 8.9 on the ground floor, and 2.9 to 5.2 for the 2nd floor were obtained for the period of investigation.
Style APA, Harvard, Vancouver, ISO itp.
2

Fordham, David R. "A Discovery-Learning Classroom Case on Accounting Data Transmission Systems". Journal of Information Systems 22, nr 2 (1.09.2008): 103–22. http://dx.doi.org/10.2308/jis.2008.22.2.103.

Pełny tekst źródła
Streszczenie:
ABSTRACT: This paper describes a classroom exercise utilizing a technique known as “discovery learning.” The activity involves a hands-on lab composed of basic building blocks of a simple wireless network. Students engage in a physical activity that demonstrates the operation of individual layers of the seven-layer Open Systems Interconnect model. In the process, they uncover conceptual knowledge normally delivered via means that are more traditional such as lecture or reading. During one such lab session, students stumbled upon a real-world control breach. This discovery, completely unplanned by the instructor, vividly illustrated the critical importance of the topical material. The experience greatly increased student interest and motivation. Assessment data confirms that student comprehension and application is significantly enhanced.
Style APA, Harvard, Vancouver, ISO itp.
3

Nugraha, Fitra. "ANALISIS KEAMANAN WIRELESS LAN PADA JARINGAN DENGAN AUTENTIKASI CAPTIVE PORTAL". Buffer Informatika 5, nr 1 (1.04.2019). http://dx.doi.org/10.25134/buffer.v5i1.1956.

Pełny tekst źródła
Streszczenie:
AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), yang digunakan untuk menyerang LAN.Penelitian akan dilakukan di Jaringan UNIKUNET (Jaringan Wireless Universitas Kuningan Kampus 1) yang menggunakan captive portal sebagai media autentikasi jaringan public hotspotnya. Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Visual Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel. Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Visual Network Stumbler, diikuti oleh Aircrack dan Wireshark, dan kemungkinan celah keamanan yang didapat.Kata kunci: Wireless Protected Access, Captive Portal, WLAN, Web Proxy dan Virtual Private Network�AbstractThis study discusses the analysis of Wireless LAN (Wireless Local Area Network) security against external attacks on the Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) protocols, which are used to attack LANs.The research will be conducted at the UNIKUNET Network (Kuningan University Campus Wireless Network 1) that uses captive portal as a media authentication for its public hotspot network. Three types of software are used as attackers, namely, attackers Visual Network Stumbler, Aircrack and Wireshark. The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. From the experimental results, it was seen that the fastest time was responded to by the WPA Protocol provided by Visual Network Stumbler attackers, followed by Aircrack and Wireshark, and possible security gaps were obtained.Keywords: Wireless Protected Access, Captive Portal, WLAN, Web Proxy and Virtual Private Network�
Style APA, Harvard, Vancouver, ISO itp.
4

Puspita Sari, Elsi, Muhammad Adri i Khairi Budayawan. "ANALISIS KECEPATAN TRANSFER DATA NIRKABEL PADA LOCAL AREA NETWORK (LAN) DI JURUSAN TEKNIK ELEKTRONIKA FAKULTAS TEKNIK UNIVERSITAS NEGERI PADANG". Voteteknika (Vocational Teknik Elektronika dan Informatika) 2, nr 2 (16.11.2018). http://dx.doi.org/10.24036/voteteknika.v2i2.3303.

Pełny tekst źródła
Streszczenie:
Indoor access point (AP) causes the signal quality is reduced because it is hampered by a wall to access the outdoors. Wi-Fi is available for students only 3 APs, and IP availability is limited so it cannot meet all demand access. In addition, all the AP are connected only through the router without using the AP controller that can cause boottleneck. The lack of rule governing UNP Wi-Fi channel Processing, because the Wi-Fi is adjacent even the Wi-Fi uses the same channel so it can causes interference. The purpose of this study is to determine whether available Wi-Fi can cover areas in blocks of Electronical Engineering Department, to know the quality of the signal with InSSIDer Software Network Stumbler and, to know the results of the speed of traffic data at any Available Wi-Fi the Department of Electronical Engineering, and find out if an Access Point (AP) which affects the quality of the indoor signal to access the outdoors. This study classified into the descriptive study with a qualitative approaching using descriptive methods. Sampling technique in this study were 95 users whose population are Electronical Engineering and Electrical Engineering from 2009 to 2012 generation. The technique of collecting data was using questionnaires and observation. Data were analyzed by using the formula. The analysis shows that the network quality is good and no signal quality percentage below 50 %. Throughput values ​​for the uplink and downlink speeds are not always the same, regardless of the size of the data is same. Free Space Path Loss value’s depends on the distance of the user and access point. The greater the distance of the user to the AP the greater Multi Router Traffic Grapher (MRTG). It can be concluded that the average daily traffic, weekly, monthly, and yearly are differerent for the next daily, weekly, monthly, yearly trafics because it depends on the users and conditions. The Wi-Fi’s facility has a very important role to help students to fullfil their needs. Keywords : Wi-Fi, LAN, Throughput, Free Space Path Loss , MRTG.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Network Stumbler software"

1

Sun, Zhaohui, i n/a. "Improving Security in WLAN With the Use of Smart Antennas". Griffith University. School of Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070115.143811.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Style APA, Harvard, Vancouver, ISO itp.
2

Sun, Zhaohui. "Improving Security in WLAN With the Use of Smart Antennas". Thesis, Griffith University, 2006. http://hdl.handle.net/10072/366543.

Pełny tekst źródła
Streszczenie:
Wireless communication systems are increasingly deployed by family, businesses, government and SOHO users because of the freedom wireless communications afford, simplicity of installation and ease of use. Along with its rapid development, the security problem in wireless communication network has attracted more and more attention. It has been estimated that the IEEE 80.211 standard is susceptible to attacks both on data content and user authentication, such as eavesdropping, spoofing and Denial of Service. These attacks are due to the standard's inherent flaws and space signal sharing caused by the omni-directional antenna it usually uses. In recent years, few studies have been undertaken which examine the use of the smart directional antenna to mitigate the security risks in mobile wireless computing networks. One of the major reasons is the antenna size, as portability is a key requirement. Due to the dielectric-material embedding and FDTD optimal design technology, a smart antenna with controllable directionality can now achieve an overall volume reduction of 80%. This has promise for application in the wireless security realm. This thesis provides a conventional background in wireless computing networks and security theory. In addition, security level definition, program in Matlab™ and corresponding experimental results are provided. To show the effectiveness of improving security in WLAN with the use of a smart directional antenna, this thesis proposes a model for predicting electromagnetic environments using a directional transmission antenna based on the Finite Element method. To validate the numerical results, a new experimental method (using Network Stumbler software) to measure the signal strength in different locations is introduced. Results from experiments using the two methods are consistent. The latter method gives the users the possibility of using a laptop (with an appropriate wireless card, software and roguing around) to detect the real-time signal strength in different locations instead of using expensive measure apparatus. Such an advantage can be valuable for the efficient implementation of indoor wireless networks for security purposes. Finally, it contributes a security solution using DE-ESMB and DE-ESPAR smart antennas in WLAN. Through these simulated and experimental results, one can conclude that the security performance in WLAN can be greatly improved by using smart directional antenna. There are five chapters in this thesis: Chapter 1 introduces the wireless communication network. Information about architecture, topology and popular wireless standards is presented in this chapter. Chapter 2 investigates the security problem in IEEE 802.11 Standards. Recent improvements in security, and their limitations, are also included. This problem is investigated by performing laboratory experiments, including a real attack on 802.11 Standards and packet capture experiments using AiroPeek NX software. Chapter 3 describes the useful parameters of smart directional antennas, and then presents the security level definition in WLAN. Simple software in Matlab™ to determine the security level according to the beamwidth of the adopted antenna is also introduced. Chapter 4 is the important part of this thesis. Simulation results of signal strength in different locations using FEMLAB™ are presented, which are consistent with the follow-up experimental results carried out in a typical office area. This chapter also describes the final security solution using the newly-designed DE-ESMB and DE-ESPAR directional antennas. Chapter 5 is a summary of the thesis. It presents the conclusions and suggests area of future research for improving the security level using smart antennas in WLAN.
Thesis (Masters)
Master of Philosophy (MPhil)
School of Engineering
Full Text
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii