scholarly journals Panel Title: Municipal Wireless Networks: Hot Spots for Mobile Business or Just Hot Air?

Author(s):  
Catherine A. Middleton

All the panelists are members of the Community Wireless Infrastructure Research Project (CWIRP) team (www.cwirp.ca). CWIRP is funded by Infrastructure Canada, to investigate the development and deployment of public ICT infrastructures. The project focuses on municipal and community wireless network initiatives.

2021 ◽  
Author(s):  
Catherine A. Middleton

All the panelists are members of the Community Wireless Infrastructure Research Project (CWIRP) team (www.cwirp.ca). CWIRP is funded by Infrastructure Canada, to investigate the development and deployment of public ICT infrastructures. The project focuses on municipal and community wireless network initiatives.


2015 ◽  
Vol 14 (6) ◽  
pp. 5809-5813
Author(s):  
Abhishek Prabhakar ◽  
Amod Tiwari ◽  
Vinay Kumar Pathak

Wireless security is the prevention of unauthorized access to computers using wireless networks .The trends in wireless networks over the last few years is same as growth of internet. Wireless networks have reduced the human intervention for accessing data at various sites .It is achieved by replacing wired infrastructure with wireless infrastructure. Some of the key challenges in wireless networks are Signal weakening, movement, increase data rate, minimizing size and cost, security of user and QoS (Quality of service) parameters... The goal of this paper is to minimize challenges that are in way of our understanding of wireless network and wireless network performance.


2006 ◽  
Vol 3 (2) ◽  
pp. 97-113 ◽  
Author(s):  
Radomir Prodanovic ◽  
Dejan Simic

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.


Author(s):  
Hafiz Munsub Ali ◽  
Jiangchuan Liu ◽  
Waleed Ejaz

Abstract In densely populated urban centers, planning optimized capacity for the fifth-generation (5G) and beyond wireless networks is a challenging task. In this paper, we propose a mathematical framework for the planning capacity of a 5G and beyond wireless networks. We considered a single-hop wireless network consists of base stations (BSs), relay stations (RSs), and user equipment (UEs). Wireless network planning (WNP) should decide the placement of BSs and RSs to the candidate sites and decide the possible connections among them and their further connections to UEs. The objective of the planning is to minimize the hardware and operational cost while planning capacity of a 5G and beyond wireless networks. The formulated WNP is an integer programming problem. Finding an optimal solution by using exhaustive search is not practical due to the demand for high computing resources. As a practical approach, a new population-based meta-heuristic algorithm is proposed to find a high-quality solution. The proposed discrete fireworks algorithm (DFWA) uses an ensemble of local search methods: insert, swap, and interchange. The performance of the proposed DFWA is compared against the low-complexity biogeography-based optimization (LC-BBO), the discrete artificial bee colony (DABC), and the genetic algorithm (GA). Simulation results and statistical tests demonstrate that the proposed algorithm can comparatively find good-quality solutions with moderate computing resources.


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


2017 ◽  
Vol 17 (1) ◽  
pp. 104-112 ◽  
Author(s):  
Zijuan Shi ◽  
Gaofeng Luo

Abstract Auction is often applied in cognitive wireless networks due to its fairness properties and efficiency. To solve the allocation issues of cognitive wireless network inamulti-band spectrum, multi-item auction mechanism and models were discussed in depth. Multi-item highest price sealed auction was designed for cognitive wireless networks’multi-band spectrum allocation algorithm. This algorithm divided the spectrum allocation process into several stages which was along with low complexity. Experiments show that the algorithm improves the utilization of spectrum frequency, because it takes into account the spectrum owner’s economic efficiency and the users’equity.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
Nidhi Sharma ◽  
Priyanka Ahlawat

The 5th Generation of wireless network technology (5G) is a rising set of cellular technologies, specifications and projected standards that promise to dramatically improve the speed and responsiveness of wireless networks. The arrival of 5G guarantees new architectures for connecting billions of IoT (Internet of Things) devices and introduces a bunch of development challenges for sensible applications. Enterprises measure are trying to find out the solutions for omnipresent property and near-real-time remote solutions and management capabilities for mission-critical IoT systems and 5G is here to answer that decision.


2016 ◽  
pp. 749-777
Author(s):  
Sulata Mitra

The next generation wireless networks will be heterogeneous wireless environments because of the coexistence of a large variety of wireless access technologies. The different networks have different architectures and protocols. So it is difficult for a user to roam from one radio system to another which can be solved by using the Internet protocol as a common interconnection protocol as it needs no assumptions about the characteristics of the underlying technologies. An all-IP wireless network is an IP-based wireless access system that makes wireless networks more robust, scalable, and cost effective. The nodes in such a network are mobile nodes as they change their location and point of attachment to the Internet frequently. The mobility management is an important research issue in an all-IP wireless network for providing seamless roaming facility to mobile nodes from one wireless system to another. The dynamic resource management is also required in this environment to ensure sufficient resource in the selected route for transmission or reception of the data packets during seamless roaming of the mobile nodes. This chapter is aimed at the researchers and the policy makers making them aware of the different means of mobility management and resource management for mobile nodes in all-IP wireless networks.


Sign in / Sign up

Export Citation Format

Share Document