scholarly journals Implementation of Virtual WLAN Using Transformerless Power Convertors

Author(s):  
Manjula B. ◽  
◽  
Devendra Kumar ◽  
Rani Medhashree ◽  
◽  
...  

Today, Wireless communication is so vital in the field of science and technology. Research regarding these capabilities suggests that Wireless LANs. Virtualization of the wireless network interface, which means using a single wireless network interface to connect to more than one network simultaneously. This paper provides an introductory study for the Creation of a virtual WLAN controller that will implement many of the configuration functions currently running on several Wireless Access point to a centralized box. This will allow seamless management of large numbers of such access points running different hardware to be seamlessly managed. The firmware running on the access point will an OpenWRT open source solution that will use CAPWAP protocol to communicate with the virtual LAN controller.

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
He-Jun Lu ◽  
Yang Yu

Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.


2015 ◽  
Vol 764-765 ◽  
pp. 900-904
Author(s):  
Yu Hsiang Hsneh ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yao Hsin Chen ◽  
Yan Ling Hwang ◽  
...  

An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to the Internet. Most of existing detection solutions are administrator-based, which is used by wireless network administrator to verify whether a given AP is in an authorized list or not. Such administrator-based solutions are limited, hardly maintained, and difficult to protect users timely when the attack is launched. Hence, we propose a client-based detection by operating the wireless network interface controller (WNIC) in monitor mode and capturing the Internet packets. Through analyzing the captured packets, client users can easily and precisely detect the evil twin attack even in a complicated AP scenario as well as avoid any threat arisen from connecting to an AP. Our method does not need to know any authorized AP list, and does not rely on data training or machine learning technique of target wireless network. Finally, we implemented a detecting system on Windows 7, which is widely used nowadays.


Author(s):  
Volodymyr Saiko ◽  
Volodymyr Nakonechnyi ◽  
Serhii Dakov ◽  
Serhii Tolyupa

One of the perspective use of THz (submillimeter) technologies is the wireless communication systems. In particular, it will lead to development of the submillimeter/THz band devices with brand new size, interference immunity and energy efficiency, for high speed video signal broadcasting, line of sight relay, for 5G cell phone transport networks, high precision radars for small size, high velocity target detection and tracking, and hidden object detection radiometric systems. Nowadays, the research of such wireless systems is focused on increase of communication channel bandwidth using superbroadband signals, which occupy all the THz band. However, it’s worth to mention, that in many perspective applications of 5th generation networks, the range has more important role, than the data transmission speed. The goal of the article is the increase of communication center’s information efficiency by the development of innovative solution for construction of the wireless broadband subscriber channel for information resource access using THz band, which provides greater efficiency in the channel’s range and bit rate. The results of THz-band wireless broadband access technical solution analysis are being provided here. The implementation of broadband access requires designating significant informational resource amount per subscriber, which, if the designated resource amount is not enough, leads to decrease in efficiency in service providing. Today’s lack of transmitter/receiver hardware of decent cost, when using unlicensed THz frequencies in backhaul network channels, leads to significant decrease of backhaul network channel length, which means decrease of the network zone size. Therefore, to avoid these flaws, the new technical solution for every subscriber’s bit rate increase, the subscriber amount increase on the territory covered by the access point, and the service coverage territory expansion possibility, is being provided here. During the THz-band channel broadcast system deployment process, one of the main issue is the channel and time resource distribution between the wireless communication system’s different sectors (directions), which is due to the change of traffic quality and amount. A generalized channel and time resource amount prediction algorithm is being provided for high efficiency wireless access channel. The control of such system can be done similarly to the server network. Territorial access point location allows: the increase of data amount being provided to the covered territory subscribers; the possibility to hold energy resource (energy per bit), which means the backhaul channel length is being preserved; the possibility of covered territory size expansion. Generally, the developed solution allows to increase the new generation wireless system data use efficiency, to increase the distance to remote subscriber network in some times, depending on the network access node’s input data stream ratio, and to increase the amount of wireless access points.


Author(s):  
P.L. RAMTEKE ◽  
D.N. CHOUDHARY

The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous access points to systems, consisting of a centralized Access Controller and Wireless Termination Points. The basic goal of centralized control architectures is to move access control, including user authentication and authorization, mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for access and control of large-scale wireless local area networks. It can allows management of these networks, Control and Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network, and can relay data between the wireless devices such as computers or printers and wired devices on the network.


2005 ◽  
Author(s):  
Ronald N. Kostoff ◽  
Rene Tshiteya ◽  
Jesse Stump ◽  
Guido Malpohl ◽  
George Karypis

Impact ◽  
2020 ◽  
Vol 2020 (6) ◽  
pp. 4-5
Author(s):  
Dar-Bin Shieh

Professor Dar-Bin Shieh, Deputy Minister at the Taiwan Ministry of Science and Technology, shares with us details of the efforts undertaken at the Ministry to promote and support scientific and technological research and development in Taiwan, including his response to the COVID-19 pandemic


Author(s):  
Tina Mirfakhraie ◽  
Ramiro Liscano ◽  
Shenjin Zhu ◽  
Yuping He

This paper presents an active trailer steering (ATS) system using a wireless communication link to facilitate exchanging information among vehicle units of articulated heavy vehicles (AHVs). A challenge for developing and implementing the wireless-communication-based ATS system is to address the problems of delay and packet-loss. Embedding wireless communication transceivers on an AHV may introduce delays for data exchange, and the transmitted data may be lost. Many reasons may lead to the delay and packet-loss, e.g., channel fading, noise burst, interference, etc. The proposed ATS system may prevent unstable motion modes of AHVs if the sensor data reach the controllers/actuators in real-time with an acceptable level of delay and packet-loss. In order to ensure the performance of the ATS control, a Kalman-filter-based estimator is introduced. The estimator uses the available dynamic data to estimate the current states of the AHV in case some sensor information is not available due to a delay or an outage in the wireless communication link. To investigate the effect of the time delay due to the wireless communication on the performance of the ATS control, co-simulations are conducted. The wireless network is modeled using TrueTime toolbox, the ATS controller is designed in SimuLink package, and the AHV model is constructed in TruckSim software. Integrating the wireless network modeled in TrueTime, the ATS controller designed in SimuLink, and the AHV model constructed in TruckSim leads to the co-simulation platform. Under the emulated double lane-change test maneuver, the effects of the wireless communication with two schemes on the direction performance of the AHV are examined.


Sign in / Sign up

Export Citation Format

Share Document