Implementation of a Digital Radiographic Image Acquisition and Retrieval System (DRIARS) Using a Wireless Network in an Orthodontic Department

2008 ◽  
Vol 9 (4) ◽  
pp. 115-123 ◽  
Author(s):  
Muralidhar Mupparapu ◽  
Robert E. Binder ◽  
John M. Cummins ◽  
Cecile A. Feldman ◽  
Mark A. Cappelli ◽  
...  

Abstract Aim The objective of this report is to describe the implementation and pilot-test of an integrated wireless local area network (WLAN) system that incorporated the Planmeca Promax® CCD based digital panoramic/ cephalometric x-ray system, Dolphin® software, and multiple remote user units to increase the efficiency of data management by the residents in the Department of Orthodontics. Background The Department of Orthodontics of the New Jersey Dental School (NJDS) acquired the Dolphin® cephalometric analysis software and the Planmeca Promax® digital panoramic/cephalometric x-ray units on separate occasions. Dolphin has been in use for many years at this institution, the current version being 10, and the Promax was acquired in the Fall of 2002. The digital panoramic and cephalometric radiographs were acquired and stored separately in the Planmeca's Dimaxis database. Report During the incorporation of the WLAN, there was an opportunity to research and install the best available security system for the WLAN so it could be a network model for the other departments within the dental school and perhaps other dental schools around the nation. Summary Digital radiographs, once obtained, can be stored locally or transmitted securely to remote locations via a local area network. This article describes the selection criteria and methodology that would optimize the transmission and retrieval of such images instantaneously on demand at chair side locations. This will not only save significant clinical time but will enhance the productivity of the clinic in the long run. Citation Mupparapu M, Binder RE, Cummins JM, Feldman CA, Cappelli MA, Matheson PB. Implementation of a Digital Radiographic Image Acquisition and Retrieval System (DRIARS) Using a Wireless Network in an Orthodontic Department. J Contemp Dent Pract 2008 May; (9)4:115-123.

T-Comm ◽  
2021 ◽  
Vol 15 (7) ◽  
pp. 28-33
Author(s):  
Albina Y. Sharifullina ◽  
◽  
Roman R. Galyamov ◽  
Rimma S. Zaripova ◽  
◽  
...  

This article discusses the stages of development, characteristics of a wireless local area network Wi-Fi, options for its topology and equipment used. Currently, there are such different types of wireless networks as Wireless Wide Area Network, Wireless Metropolitan Area Networks (Wireless Neighborhood Area Network), Wireless Local Area Network, Wireless Personal Area Network. Each of the listed wireless networks has its own specific range and application. Wireless LAN Wi-Fi refers to the Wireless Local Area Network. The first wireless LAN standard, Wi-Fi, was approved in 1997. From the moment of their appearance to the present day, the following standards of this network have appeared: 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, 802.11ad, 802.11ax. For each standard, the speeds and frequency ranges at which the data transmission was carried out are indicated, and the technologies on which they are built are described. Wireless LAN Wi-Fi has three topologies: 1) Ad-Hoc (point-to-point) or Independent Basic Service Set; 2) Basic Service Set (“client / server”) and 3) Extended Service Set (“extended service areas”). To build a Wi-Fi network, network adapters, access points, routers, ADSL modems, Wi-Fi phones, Wi-Fi antennas, Wi-Fi repeaters are used. Wi-Fi adapters are used by devices that do not have a built-in Wi-Fi module. Wi-Fi access points are designed for organizing wireless access within a local network. Wi-Fi routers are designed to route traffic on a computer network. ADSL modems are used to access the Internet over a telephone line. Wi-Fi repeaters are used to expand the coverage of a wireless network using already installed equipment. Wi-Fi phones are wireless IP phones. Wi-Fi antennas are used to extend the range of a wireless network.


Author(s):  
Indra Dwi Rianto

WiFi Protected Setup (WPS) is a standardized function supported by numerous vendors of wireless routers and access point to help set up connection to a wireless local area network. It is designed to simplify the set up and generally enabled by default. Due to design flaw, the WPS or QSS PIN is susceptible to a brute forceattack. In this paper, we test the security vulnerability occurred, evaluate the performance and give recommendations to anticipate the attack.


Author(s):  
P.E. Orukpe ◽  
T.O. Erhiaguna ◽  
F.O. Agbontaen

The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt to document and classify the flaws in Wi-Fi Protected Setup (WPS), then proving the existence of this flaw with a WPS Pin Cracking Method, and presenting a Reverse Engineering countermeasure to eliminating WPS from an Access Point firmware, including other recommendations to helping the network administrators not repeat the errors that are the root causes of flaws of wireless networking in general from being exploited. By implementing the various techniques discussed in this paper, a better and more secure wireless network will be developed.


2020 ◽  
Vol 245 ◽  
pp. 07009
Author(s):  
Li Wang ◽  
Mingshan Xia ◽  
Fazhi Qi

Wireless local area network (WLAN) technology is widely used in various enterprises and institutions. In order to facilitate the use of users, they often provide a single SSID access point, resulting in different identities of users authenticated and authorized can connect to the wireless network anytime, anywhere as needed and obtain the same accessible network resources such as bandwidth, access control (ACL) and so on. Multiple SSID can solve the problem but it will be confused to users who don’t know which SSID can be connected. Although we could prevent visitors from accessing intranet resources by isolating the wireless network from the internal network, this would make it impossible for users to use the wireless network for internal office work. In this paper, we propose an access control system that grouping users according to the different identities and users authenticated and authorized can access different network resources because a wireless access point dynamically maps an SSID provided by a mobile station to a BSSID based on a VLAN assignment. The deployment experiment of the solution proves that users of different identities accessing the same wireless network can set different access policies, which effectively improves the security of the wireless network and simplifies the management of the wireless network.


Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


Jurnal Teknik ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Heru Abrianto

Microstrip antenna which designed with dual feeding at 2.4 GHz and 5.8 GHz can meet WLAN (Wireless Local Area Network) application.Antenna fabrication use PCB FR4 double layer with thickness 1.6 mm and dielectric constant value 4.4. The length of patch antenna according to calculation 28.63 mm, but to get needed parameter length of patch should be optimized to 53 mm. After examination, this antenna has VSWR 1.212 at 2.42 GHz and 1.502 at 5.8 GHz, RL -13.94 dB at 2.42 GHz and -20.357 dB at 5.8 GHz, gain of antenna 6.16 dB at 2.42 GHz and 6.91 dB at 5.8 GHz, the radiation pattern is bidirectional. Keywords : microstrip antenna, wireless LAN, dual polarization, single feeding technique


2018 ◽  
Author(s):  
Kiramat

IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communications. Maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802). This document highlights the main features of IEEE 802.11n variant such as MIMO, frame aggregation and beamforming along with the problems in this variant and their solutions


2020 ◽  
Vol 1550 ◽  
pp. 032078
Author(s):  
Kaigang Fan ◽  
Xin Chen ◽  
Biao Zhao ◽  
Jiale Wang ◽  
Wenbin Cui ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document