wireless local area network (WLAN) Research Papers (original) (raw)

This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security. KeywordsWLAN... more

This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security. KeywordsWLAN Security model; WLAN Security; WLAN attacks & Vulnerabilities; WLAN Security Features Selection; WLAN Security Measurement;

Though WLAN wireless network has been widely deployed as the main split-flow deployment of the communication network, little study emphasizes its performance as WLAN protocols were only designed for the public communicating conveniently... more

Though WLAN wireless network has been widely deployed as the main split-flow deployment of the communication network, little study emphasizes its performance as WLAN protocols were only designed for the public communicating conveniently with each other. Actually that too much wireless access points assembling together will cause self-interference to the whole WLAN network. This paper investigates the distributed coordination function (DCF) learn and the performance study of 802.11b networks. Firstly, our study illustrates the performance of its MAC layer and its fairness issues related to DCF. Next we propose the details which should be paid attention to in deploying network services. Then, performance analyses are evaluated by simulation and real test for a dense wireless network. Our main goal is to give proposals to network operators how to design a WLAN network more standardized and orderly.

Wireless Local Area Networks (WLAN) was once a single network solution. Yet now, it contributes to all part of business and computer industry. Thus, WLAN security measures need special attention. In order to identify WLAN networks’... more

Wireless Local Area Networks (WLAN) was once a single network solution. Yet now, it contributes to all part of business and computer industry. Thus, WLAN security measures need special attention. In order to identify WLAN networks’ vulnerability, some intrusion detection systems, architecture, and potential threats in the literature of this area is investigated. This approach is to categorize present wireless intrusion detection system (IDS) and detection technique. Several advantageous and drawbacks are presented and an in-depth critical literature review is presented. Different WLAN attack types and review some metrics in relation to operability and performance of IDS is summarized and extensively argued which can be conducted through integrating both practitioners and scholars. The future research areas are also discussed.

This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).

— Network Management Systems have played a great important role in information systems. There are different network management systems such as Remote monitoring, Desktop Sharing, Bandwidth management etc. This paper elaborates the above... more

— Network Management Systems have played a great important role in information systems. There are different network management systems such as Remote monitoring, Desktop Sharing, Bandwidth management etc. This paper elaborates the above mentioned issues i.e. remote desktop sharing, Bandwidth Management and Remote monitoring which are accumulated in single network management system. Remote desktop sharing is a technology that allows remote access and remote collaboration on a person's computer. Remote Desktop Sharing provides the capability to technology consultants, administrator or anyone to have full access and control of home computers, office workstations and servers remotely. Another application in network system is Bandwidth management. Bandwidth management is the process of measuring and controlling the communications (traffic, packets) on a network link, to avoid filling the link to capacity or overfilling the link, which would result in network congestion and poor performance of the network. Bandwidth is reserved for each application to ensure the QoS. To ensure the QoS guaranteed services, the SS may reserve more bandwidth than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper, we propose a scheme, named Bandwidth management, to utilize the unused bandwidth without changing the existing bandwidth reservation. The idea of the proposed scheme is to allow other SSs to utilize the unused bandwidth when it is available. Thus, the system throughput can be improved while maintaining the same QoS guaranteed services. Another important feature of this network management system is Remote desktop monitoring which can be very useful for efficient management of available bandwidth. This paper specially highlights remote monitoring and control refers to the measurement of disparate devices from a network operations center or control room and the ability to change the operation of these devices from that central office. Remote monitoring allows monitoring operations of one computer through other computer in network. this can be done using TCP/IP protocol. Using this feature server can shutdown client's PC. If server finds out that any client is misusing bandwidth he may warn him by sending alert message if client continues misuse of bandwidth he may shutdown his Computer. This paper intends to increase network management functions by making system capable of utilizing available bandwidth efficiently with help of Remote monitoring functionalities. Bandwidth management feature relies on user-defined bandwidth classes and policy rules to manage the available bandwidth; this avoids wastage of precious available bandwidth. If a user uses this system user can simultaneously monitor client's desktop, share desktop and dynamically handle available bandwidth as per the requirement of client. This system uses Wi-Fi (WLAN) to connect computers in network. This paper is to implement the client/server network management system using Wi-Fi. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.

Wireless Local Area Networks (WLAN) was once a single network solution. Yet now, it contributes to all part of business and computer industry. Thus, WLAN security measures need special attention. In order to identify WLAN networks'... more

Wireless Local Area Networks (WLAN) was once a single network solution. Yet now, it contributes to all part of business and computer industry. Thus, WLAN security measures need special attention. In order to identify WLAN networks' vulnerability, some intrusion detection systems, architecture, and potential threats in the literature of this area is investigated. This approach is to categorize present wireless intrusion detection system (IDS) and detection technique. Several advantageous and drawbacks are presented and an in-depth critical literature review is presented. Different WLAN attack types and review some metrics in relation to operability and performance of IDS is summarized and extensively argued which can be conducted through integrating both practitioners and scholars. The future research areas are also discussed.

Wireless local area network (WLAN) has been widely used in many sectors. The popularity gained is due to many reasons, such as ease of installation, installation flexibility, mobility, reduced cost-of-ownership, and scalability. However,... more

Wireless local area network (WLAN) has been widely used in many sectors. The popularity gained is due to many reasons, such as ease of installation, installation flexibility, mobility, reduced cost-of-ownership, and scalability. However, regardless of the benefits mentioned above, WLAN have some security threats, in which anyone who use it or intend to use it should be aware. This paper begins by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at Denial of Service, Spoofing, and Eavesdropping. This paper will also tell about the reasons of loss of data and the security measures that are involved to reduce the loss of data from hackers by using the data confidentiality and prevention and access control mechanism.

A randomized algorithm makes random choices during its execution. The behavior of such an algorithm may thus be random even on a fixed input. The process of designing and analyzing a randomized algorithm focuses on establishing that it is... more

A randomized algorithm makes random choices during its execution. The behavior of such an algorithm may thus be random even on a fixed input. The process of designing and analyzing a randomized algorithm focuses on establishing that it is likely to behave “well” on every input. The likelihood in such a statement depends only on the probabilistic choices made by the algorithm during execution and not on any assumptions about the input. It is especially important to distinguish a randomized algorithm from the average case analysis of algorithms, where one analyzes an algorithm assuming that its input is drawn from a fixed probability distribution. Hence, in this seminar work, a detailed review of a randomized algorithm was carried out, different classes of a random algorithm were discussed, based on this classes practical examples were model with this algorithm and their results were presented has well.

Communication-Based Train Control (CBTC) system is an automated train control system to ensure the safe operation of rail vehicles using data communication. Bidirectional wireless train–ground communications is used to transfer... more

Communication-Based Train Control (CBTC)
system is an automated train control system to ensure the safe
operation of rail vehicles using data communication.
Bidirectional wireless train–ground communications is used to
transfer control data between trains and wayside equipment.
Wireless local area network (WLAN) based CBTC has impact
on train control performance while taking handoff decisions.
This may leads to communication interrupt and long latency.
Inorder to minimize the handoff latency and to improve the
performance, a handoff scheme in CBTC system based on
WLANs with multiple-input-multiple-output is proposed. In
this channel estimation errors and the tradeoff between MIMO
multiplexing gain and diversity gain are considered in making
handoff decisions. Handoff decisions and physical layer
parameters are optimised to improve the train control
performance in CBTC systems. The handoff problem is
formulated as a partially observable Markov decision process
(POMDP), and the optimal handoff policy can be derived to
minimize the handoff latency. The handoff decision and
physical layer parameters adaptation problem is formulated as
a stochastic control process. Simulation result shows that the
proposed approach can significantly improve the control
performance in CBTC systems.

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs)... more

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.

This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4... more

This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of-31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.

This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security

The WLAN and Bluetooth applications become popular in mobile devices, integrating GSM and ISM bands operation in one compact antenna, can reduce the size of mobile devices. Recently, lot many investigations are carried out in designing a... more

The WLAN and Bluetooth applications become popular in mobile devices, integrating GSM and ISM bands operation in one compact antenna, can reduce the size of mobile devices. Recently, lot many investigations are carried out in designing a dual band antennas with operating frequencies in GSM band and in ISM band for mobile devices. Printed monopoles are under this investigation. In this paper, dual-band printed monopoles are presented to operate at GSM band i.e. 900 MHz and ISM band i.e. 2.4 GHz. We intend to observe the antenna characteristics on the network analyzer and verify the theoretical results with the practical ones.

In dense wireless local area networks (WLANs), the primary causes of interference and hindrance to spatial reuse are the well-known hidden node problem (HNP) and the exposed node problem (ENP). In this paper, we propose a joint solution... more

In dense wireless local area networks (WLANs), the primary causes of interference and hindrance to spatial reuse are the well-known hidden node problem (HNP) and the exposed node problem (ENP). In this paper, we propose a joint solution to these problems. The proposed mechanism, referred to as Probe/PreAck (PR/PA), utilizes the concept of a two-way handshake for efficient channel reservation and spatial reuse by means of two control frames called PR and PA. The PR frame is designed for the semi-reservation of a channel initiated by a transmitting node, while the PA frame is used for the receiver-oriented permission of a channel reservation. Once a transmitting node advertises a PR frame, the channel is temporarily reserved, and the channel reservation is finally completed after the node receives the corresponding PA frame. Otherwise, the channel reservation is immediately released. Unlike the ready-to-send/clear-to-send mechanism, which is a well-known solution to HNP, the proposed mechanism does not unnecessarily prevent nodes from accessing the channel but selectively blocks transmitting and receiving nodes when they overhear the PA and PR frames transmitted by neighboring nodes, respectively. In this way, the proposed PR/PA mechanism effectively deals with both HNP and ENP in a unified framework. We further enhance the PR/PA mechanism by devising an immediate destination switching scheme, which is implemented in access points (APs) to improve the downlink throughput. If an AP fails to complete the exchange of PR and PA frames with a specific destination, it sends another PR frame to a different destination node without performing a new back-off procedure. Moreover, we adopt the transmission time control scheme to assure successful spatial reuse in multiple basic service set (BSS) WLANs. By adjusting the transmission time of the data frames simultaneously transmitted in different BSSs, severe interference between the data and acknowledgment frames can be avoided. The results of a simulation study confirmed that the proposed mechanism outperformed conventional mechanisms in dense multi-BSS WLANs; the downlink throughput was increased by more than 10 times while the overall network throughput was increased by approximately 50%. INDEX TERMS Dense networks, exposed node, hidden node, IEEE 802.11, spatial reuse, RTS/CTS.

In this paper, a novel scheduling scheme for the Fourth Generation (4G)-Wireless Local Area Network (WLAN) network is proposed to ensure that end to end traffic transaction is provisioned seamlessly. The scheduling scheme is divided into... more

In this paper, a novel scheduling scheme for the Fourth Generation (4G)-Wireless Local Area Network (WLAN) network is proposed to ensure that end to end traffic transaction is provisioned seamlessly. The scheduling scheme is divided into two stages; in stage one, traffic is separated into Actual Time Traffic (ATT) and Non-Actual-Time Traffic (NATT), while in stage two, complex queuing strategy is performed. In stage one, Class-Based Queuing (CBQ) and Deficit Round Robin (DRR) are used for NATT and ATT applications, respectively to separate and forward traffic themselves according to source requirements. Whereas in the stage, two Control Priority Queuing (CPQ) is used to assign each class the appropriate priority level. Evaluation of the performance of the integrated network was done according to several metrics such as end-to-end delay, jitter, packet loss, and network’s throughput. Results demonstrate major improvements for AT services with minor degradation on NAT applications aft...

This work deals with use of Open Source technologies for implementing mobile GIS solutions, in order to face the need of moving GIS applications from desktop or web platforms to mobile platforms - like PDAs, smartphones, etc. -... more

This work deals with use of Open Source technologies for implementing mobile GIS solutions, in order to face the need of moving GIS applications from desktop or web platforms to mobile platforms - like PDAs, smartphones, etc. - accordingly with the great and growing diffusion of mobile devices and location based services. The implemented mobile GIS is a client-server solution based on a Java servlet inside Apache Tomcat servlet container. The GIS functionalities are obtained by MapServer Java MapScript and by some classes implemented expressly. The paper will discuss the technological aspects of the mobile GIS and will show some specific applications, in particular for archaeological contexts and for issues of civil protection. Moreover, other related topics will be treated: how to make the mobile GIS context aware, how to integrate it with user positioning and object of interest location, how to face some problems (slow loading of images, connection costs) coming from the chosen ar...

A triple rectangular slotted microstrip patch antenna is designed and investigated with and without slot using CST Software. By using the triple rectangular shaped slot the designed antenna operates at 2.4GHz (ranging from 2.3704 GHz... more

A triple rectangular slotted microstrip patch antenna is designed and investigated with and without slot using CST Software. By using the triple rectangular shaped slot the designed antenna operates at 2.4GHz (ranging from 2.3704 GHz (Gigahertz) to 2.4391 GHz at-10dB return loss) for WLAN (Wireless Local Area Network) and 3.6GHz (ranging from 3.5643 GHz to 3.6548 GHz at-10dB return loss) for WiMAX (Worldwide Interoperability for Microwave Access) applications having a maximum return loss-28.5dB and-25.4dB respectively. For the design of this antenna we have chosen FR-4 (lossy) as substrate having permittivity 4.3. The designed antenna has appreciable values of gain and directivity at both the frequencies. The proposed antenna works on the principle of excitation of the slots at the operating frequencies. The antenna was designed keeping in mind the two major Wireless standards i.e., WLAN and WiMAX bands of frequencies. The proposed triple-rectangular slots are unique in terms of its construction and have appreciable results at the operating frequencies.

This letter presents a new printed slot antenna with cavity back for WLAN Access Points (Base Stations) providing wideband operation bandwidth at least from 2.5 to 4.8 GHz. The design is based upon an ultrawideband antenna configuration... more

This letter presents a new printed slot antenna with cavity back for WLAN Access Points (Base Stations) providing wideband operation bandwidth at least from 2.5 to 4.8 GHz. The design is based upon an ultrawideband antenna configuration modified with the inclusion of a cavity back in order to produce stable unidirectional radiation pattern. The new configuration also ensures a stable linear polarization with cross-polarization level below -20dB. Results are confirmed with measurements. Not disregarding other applications, the new design is especially adequate for MIMO space and polarization diversity arrangements, presenting low cross-polarization and very low coupling to adjacent elements.

A wireless Mobile Ad hoc Network (MANET) is a network temporarily established by wireless nodes which are capable of moving randomly and communicating without a specific infrastructure of the network. The dynamically changing network... more

A wireless Mobile Ad hoc Network (MANET) is a network temporarily established by wireless nodes which are capable of moving randomly and communicating without a specific infrastructure of the network. The dynamically changing network topology of MANETs and security vulnerabilities of routing protocols exposes it to a wide range of security threats against which it is unprotected. One of the most conventional attack by malicious nodes, known as the black hole attack, is discussed in this paper. Not only is it defined and discussed on the basis of its classification, but we have also provided with effective methods of detecting and removing black hole attacks and furthermore, preventing black hole attacks so that we do not have to go through the hazard of detecting and removing it.

This work deals with use of Open Source technologies for implementing mobile GIS solutions, in order to face the need of moving GIS applications from desktop or web platforms to mobile platforms - like PDAs, smartphones, etc. -... more

This work deals with use of Open Source technologies for implementing mobile GIS solutions, in order to face the need of moving GIS applications from desktop or web platforms to mobile platforms - like PDAs, smartphones, etc. - accordingly with the great and growing diffusion of mobile devices and location based services. The implemented mobile GIS is a client-server solution based on a Java servlet inside Apache Tomcat servlet container. The GIS functionalities are obtained by MapServer Java MapScript and by some classes implemented expressly. The paper will discuss the technological aspects of the mobile GIS and will show some specific applications, in particular for archaeological contexts and for issues of civil protection. Moreover, other related topics will be treated: how to make the mobile GIS context aware, how to integrate it with user positioning and object of interest location, how to face some problems (slow loading of images, connection costs) coming from the chosen ar...

IP telephony is a form telecommunication which involves the transmission of voice, video streams and possibly data on a network. It establishes an interactive communications session between two or more users who are geographically... more

IP telephony is a form telecommunication which involves the transmission of voice, video streams and possibly data on a network. It establishes an interactive communications session between two or more users who are geographically separated.
This project provides a simple, accurate and affordable method of implementing a call log algorithm for communication between IP desk phone and a smart phone technology on a standalone deployment and on an existing Communication and Information Science network.
In this project, Elastix software was installed on a high capacity system that serves the gateway and database server which captures and stores the call logs between the desk phone and the smart phones. This server is then configured to provide to provide a real time voice communication in the faculty of Communication and Information Science. To access this facility, users in the faculty have to install X-lite 4.0 (a digital Softphone) both on their devices which could be a Personal computer, android smart phones, tablets etc.

Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and Wi-Fi focus on providing... more

Voice over IP (VoIP) applications such as Skype, Google Talk, and FaceTime are promising technologies for providing cheaper voice calls to end users over extant networks. Wireless networks such as WiMAX and Wi-Fi focus on providing perfection of service for VoIP. However, there are numerous aspects that affect quality of voice connections over wireless networks [13]. The adoption of Voice over Wireless Local Area Network is on tremendous increase due its relief, non-invasive, economicexpansion, low maintenance cost, universal coverage and basic roaming capabilities. However, expansion Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is a challenging task for many network specialist and engineers. Voice codec is one of the most critical components of a VoIP system. In this project, we evaluate the performance analysis of various codecs such as G.711, G.723 and G.729 over Wi-Fi networks. NS2 Wi-Fi simulation models are designed. Performance metrics such as Mean Opinion Score (MOS), average end-to-end latency, and disconcert are evaluated and discussed [13]. 1. In this paper, our area of interest is to compare and study the performance analysis of VoIP codecs in Non-mobility scenarios by changing some parameters and plotting the graphs throughput, End to end Delay, MOS, Packet delivery Ratio, and Jitter by using Network Simulator version. 2. In this paper we analyze the different performance parameters, Recent research has focused on simulation studies with non-mobility scenarios to analyze different VoIP codecs with nodes up to 5. We have simulated the different VoIP codecs in non-mobility scenario with nodes up to 300.

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs)... more

This work evaluates the effect(s) of common encryption algorithms on throughput, processing time and power consumption of a wireless system. Three different encryption algorithms commonly used for wireless local area network (WLANs) namely; Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish were evaluated and studied. The three algorithms were simulated and compiled using the default settings in .NET 2010 visual studio. The results show that Blowfish algorithm outperforms other algorithms in terms of energy consumption, processing time and throughput for Text data, Audio files and Image files. While DES is optimal both in its throughput and energy requirement.

TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA... more

TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.

This paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of selected WLAN... more

This paper identifies the gaps in IEEE 802.11 standards and supporting technologies and then proposes a conceptual architecture that can be used to develop a model for analyzing and predicting the security performance of selected WLAN security features and configurations

A new wideband compact slot antenna array for indoor WLAN Access Points (AP) is described, covering several wireless communication services from 2.4 to 4.8 GHz, that is especially designed to enhance MIMO system capacity. The array... more

A new wideband compact slot antenna array for indoor WLAN Access Points (AP) is described, covering several wireless communication services from 2.4 to 4.8 GHz, that is especially designed to enhance MIMO system capacity. The array topology provides both spatial and polarization diversity. Despite very close packing of the array elements, these exhibit very low mutual coupling and low cross-polarization, greatly favoring MIMO diversity gain. A detailed MIMO performance comparison is conducted against a common array of patches in indoor environment, based both on simulation and indoor measurements: the new antenna shows a clear improvement in terms of channel capacity.