Wireless LAN Access Technology

Author(s):  
Spiros Louvros ◽  
Gerasimos Pylarinos ◽  
Stavros Kotsopoulos

During the last decade mobile communication networks follow the evolution of fixed networks in order to provide moving subscribers with all the services and applications of fixed subscribers. This however is unfeasible due to restrictions and limitations imposed by the hostile radio channel. The global system mobile (GSM) network, known as 2G technology (Mouly & Pautet, 1992), is adequate in meeting voice communication speeds of a typical subscriber since it offers limited communication capabilities (< 9.6 kb/s). The ideal mobile network would be able to provide moving subscribers with continuous access to every possible voice or data network, leading to the realization of a “mobile office.” The result of this effort (although somewhat restrictive in terms of realizable bit rates) was another evolution in mobile networks, the general packet radio service (GPRS) network (usually referred to as 2.5G), with available data rates of approximately 40 kb/s up to 100 kb/s. The universal mobile telecommunication system (UMTS) (usually referred to as the third-generation cellular network or 3G), with competitive rates of 300 kb/s and a future possible upgrade up to 2 Mb/s, is the realization of a new generation of telecommunications technology for a world in which personal services will be based on a combination of fixed and mobile services to form a seamless end-to-end service for the subscriber. Its realization at least requires provision of a unified presentation of services to the end user, mobile technology that supports a very broad mix of communication services and applications, and finally on-demand flexible bandwidth allocation reaching 2Mb/s per subscriber. Moreover the exploitation of pure (not tunneled) Internet protocol (IP) interconnection of network elements between each other for data exchange and operation and maintenance purposes should be available, along with the provision of flexible end-to-end all-IP connectivity in terms of user information. 3.5G and 4G (Esmailzadeh, Nakagawa, & Jones, 2003) systems are already under investigation. Aiming to “context-aware personalized ubiquitous multimedia services” (Houssos et al., 2003), 3.5G systems promise rates of up to 10Mb/s (3GPP Release 5), while with the use of greater bandwidth, these rates may raise even more in 4G (Esmailzadeh et al., 2003). On the other hand, the last five years a standardization effort has started for the integration of Wireless local area network (WLAN) in order to support higher bit rates in hotspots or business and factory environments, with a cell radius on the order of 100m. In any case, 4G and WLAN technology are going to be based on an IP backbone between access points (APs) and access controllers or routers and the Internet. Mobile IPv4 and IPv6 are already under investigation (Lach, Janneteau, & Petrescu, 2003) to provide user mobility support for context-type services.

Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


2013 ◽  
Vol 278-280 ◽  
pp. 582-585
Author(s):  
Rong Gao ◽  
Qi Sheng Wu ◽  
Lan Bai

A tms320dm642 and wireless fidelity based fire monitoring robot is designed. Flame features, both static and dynamic detecting algorithm, combine with long wave infrared (LWIR) is equipped to achieve the goal of monitoring fire. When the suspected fire event happens, Fire warning message will be sent to remote terminal through the wireless LAN automatically. Infrared image of the fire can be transmitted through the wireless network under the control of remote terminal. As LWIR camera can even look through the dense smoke of fire, fire source will be located accurately, rescuing and fire fighting work will carry on better and with less injury.


2005 ◽  
Vol 33 (3) ◽  
pp. 39-45
Author(s):  
Earl Lawrence ◽  
George Michailidis ◽  
Vijay N. Nair

Author(s):  
Jonathan Bishop

Sexual harassment has been a problem within organisations for some time. Its manifestation in electronic communication networks can be seen to amount to cyber-bullying or cyber-stalking. Through looking at records relating to an instance of sexual harassment at a higher education institution, including from that member of staff's workplace, and those created by referrals to the police, the court service, and their workplace, this chapter shows how a piece of assistive technology called the ‘Protective Technology for Ensuring Guardianship of Environmental Resources' (PROTEGER) can automatically detect sexual harassment narratives. In this context, ‘environmental resources' should refer to both humans and documents. Human resource managers would be better equipped to deal with disputes between staff if PROTEGER was running on their local area network as it might not be a matter of one member of staff's word against another's.


Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


2015 ◽  
Vol 2015 ◽  
pp. 1-11
Author(s):  
Chang-Seop Park ◽  
Hyun-Sun Kang ◽  
Jaijin Jung

A new key management and security scheme is proposed to integrate Layer Two (L2) and Layer Three (L3) keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN). Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6) that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP) authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.


2014 ◽  
Vol 721 ◽  
pp. 728-731
Author(s):  
Da Wei Dong ◽  
Xiao Guo Liu ◽  
Tian Jing

To reduce the number of inter-disturb access points and the interference among access points in same channel, with research on interference issus and channel assignment algorithms of wireless local area network, a scheme suitable for centralized wireless local area network was proposed aiming to minimize the total interference among access points, which comprehensively considerate the number of neighbor and the received power. And then the algorithm with cases was simulated and analyzed, the result of NS2 simulation indicated that the algorithm was simple, effective and feasible, which could realize dynamic adjustment to the wireless LAN RF channel and had a better load balance effect among non-overlapping channels.


Author(s):  
C Mohanapriya ◽  
J Govindarajan

<p>The video streaming is one of the important application which consumes more bandwidth compared to non-real-time traffic. Most of the existing video transmissions are either using UDP or RTP over UDP. Since these protocols are not designed with congestion control, they affect the performance of peer video transmissions and the non-real-time applications. Like TFRC, Real-Time Media Congestion Avoidance (RMCAT) is one of the recently proposed frameworks to provide congestion control for real-time applications. Since the need for video transmission is increasing over the wireless LAN, in this paper the performance of the protocol was studied over WLAN with different network conditions. From the detailed study, we observed that RMCAT considers the packet losses due to the distance and channel conditions as congestion loss, and hence it reduced the sending rate thereby it affected the video transmission.</p>


Sign in / Sign up

Export Citation Format

Share Document