scholarly journals Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management

Author(s):  
Muffy Calder ◽  
Michele Sevegnani
2019 ◽  
Vol 9 (1) ◽  
pp. 119-139

This paper presents a case study involving the deployment of a secure environment on the computer network at the City Hall in Palmeira das Missões - RS, throughout the definition of a physical and logical infrastructure, supported at concepts of management of computer networks and information security. Through the creation of Vlans (Virtual Local Areas Networks) and definition of DMZ (Demilitarized Zone) defined to achieve the level of security and network management required by the IT department, as well as provide greater reliability and integrity of information that travel on the network so that the users can perform their tasks more dynamically in a secure and agile environment. The main contribution of this case study was the implementation of a security and management in the computer network at the City Hasll in Palmeira das Missões – RS.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Li Chao

In this case study, you will encounter some of the issues of lab development for delivering lab-based information systems courses online. Many small campuses have very limited budget or no budget at all for the computer lab specifically designed for information systems majors. Sometimes, even with new computers purchased, very few people know how to set them up for lab-based information systems (IS) courses. What are the software and hardware requirements for getting the lab online? How much will it cost? Where can you find resources for the lab development? To ensure quality teaching on IS-related topics, you have to deal with these issues. This case study will discuss how to create a lab that allows students to get hands-on practice for courses such as network management or database processing online with a shoestring budget.


Author(s):  
Salman H. Khan ◽  
Arsalan H. Khan ◽  
Zeashan H. Khan

The role of computational intelligence techniques in applied sciences and engineering is becoming popular today. It is essential because the autonomous engineering applications require intelligent decision in real time in order to achieve the desired goal. This chapter discusses some of the approaches to demonstrate various applications of computational intelligence in dependable networked control systems and a case study of teleoperation over wireless network. The results have shown that computational intelligence algorithms can be successfully implemented on an embedded application to offer an improved online performance. The different approaches have been compared and could be chosen as per application requirements.


Author(s):  
Christos Bouras ◽  
Apostolos Gkamas ◽  
Kostas Stamos

In this chapter, the authors present some of the latest developments related to the provisioning of Quality of Service (QoS) in today’s networks and the associated network management structures that are or will be deployed to support them. They first give a brief overview of the most important Quality of Service proposals in the areas of Layer 2 (L2) and Layer 3 (L3) QoS provisioning in backbone networks, and they discuss the network management structures and brokers that have been proposed in order to implement these services. As a case study, they describe the pan-european research and academic network, which is supported centrally by GEANT and which encompasses multiple independent NRENs (National Research and Education Networks). In the last few years, GEANT has developed and deployed a number of production and pilot services meant for the delivery of quality network services to the end users across Europe.


2013 ◽  
Vol 401-403 ◽  
pp. 1272-1277
Author(s):  
Wen Wu Hua ◽  
Zhong Hu Yuan ◽  
Xiu Zhen Yu

This paper has designed a ZigBee application which is based on the IEEE address. This applications operating environment is TIs protocol stack called Z-Stack. The application can realize the following functions: wireless network self-organizing, the automatic acquisition and information upload. The upper machine communication protocol uses the IEEE address as device ID. This insures the application can find the datas physical source. With the help of network address, the applications speed and any other performance indicators will not drop. Using this application, the user can immediately find the accurate position directly after the security problem appeared. It has improved the efficiency of the wireless network management obviously.


IEEE Network ◽  
2011 ◽  
Vol 25 (6) ◽  
pp. 41-49 ◽  
Author(s):  
Kostas Tsagkaris ◽  
Panagiotis Vlacheas ◽  
George Athanasiou ◽  
Vera Stavroulaki ◽  
Stanislav Filin ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document