A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A scalable wireless virtual LAN
1996
Proceedings of the 2nd annual international conference on Mobile computing and networking - MobiCom '96
This paper presents a Wireless Virtual Local Area Network ( WVLAN) to support mobility in IP-over-ATM networks. ...
LAN architecture. ...
The procedure
executed
at a
PBS receiving
such a MAC
frame is discussed
in this section. ...
doi:10.1145/236387.236444
dblp:conf/mobicom/LiuVE96
fatcat:3rs4odpx2nal5irtswpanqoxqi
A Wireless LAN-Based Robust and Scalable Virtual Laboratory for E-Learning
[chapter]
2006
Lecture Notes in Computer Science
Wireless LAN based lab resources make this virtual laboratory scalable and redundancy management server makes it robust ...
This paper describes design and implementation of wireless LAN based virtual laboratory (WLANVL) used as an e-learning environment. ...
There are choices for users when they begin to build a virtual instrument for measurement. ...
doi:10.1007/11736639_42
fatcat:b3ock3msh5effkyfvc2el62qi4
Public access mobility LAN: extending the wireless internet into the LAN enwronment
2002
IEEE wireless communications
service providers with effective authentication and billing, and a multisegment LAN environment including handoffs. ...
Public wireless communications will increasingly extend into wireless LAN environments in order to meet the ubiquitous access, high data rate, and local services demands of future Internet appliances. ...
wireless LAN context. ...
doi:10.1109/mwc.2002.1016707
fatcat:w2w45kqmbvcubljkjw3epaiowy
Adaptive wireless thin-client model for mobile computing
2009
Wireless Communications and Mobile Computing
Secondly, a proxy-based adaptation framework is developed for wireless thin-client systems, which dynamically optimizes performance of a wireless thin client via dynamically discovered context. ...
Additionally, our adaptation framework uses highly scalable wavelet-based image coding to provide scalable QoS that can degrade gracefully. ...
ACKNOWLEDGMENT The authors thank the developers of the following opensource projects which we used in the implementation and testing of our proposed adaptation framework; Virtual Network Computing system ...
doi:10.1002/wcm.603
fatcat:yt7xv6oglnfjhp2ia5hvgiuzum
Implementation of Virtual WLAN Using Transformerless Power Convertors
2018
INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING
Virtualization of the wireless network interface, which means using a single wireless network interface to connect to more than one network simultaneously. ...
This paper provides an introductory study for the Creation of a virtual WLAN controller that will implement many of the configuration functions currently running on several Wireless Access point to a centralized ...
WLAN To Know WLAN we need to know the LAN, which is simply a way of interconnecting systems together within a single business area or an organization. III. ...
doi:10.35121/ijapie201804227
fatcat:tolrj6egxfdc3n7wjgzycxfivy
Scalable Video Transcaling for the Wireless Internet
2004
EURASIP Journal on Advances in Signal Processing
Extensive simulation results of video TS over bit rate ranges supported by emerging wireless LANs are presented. ...
With TS, a scalable video stream, that covers a given bandwidth range, is mapped into one or more scalable video streams covering different bandwidth ranges. ...
TS can be supported at gateways between the wired Internet and wireless/mobile access networks (e.g., at a proxy server adjunct to an access point (AP) of a wireless LAN). ...
doi:10.1155/s111086570430805x
fatcat:v2nencrbsnbbllnc3oboxzze4e
TranScaling
2001
Proceedings of the 4th ACM international workshop on Wireless mobile multimedia - WOWMOM '01
We argue that an Internet/wireless network gateway represents a good candidate for performing transcaling. ...
With transcaling, a scalable video stream, that covers a given bandwidth range, is mapped into one or more scalable video streams covering different bandwidth ranges. ...
TransScaling can be supported at gateways between the wired Internet and wireless/mobile access networks (e.g., at a proxy server adjunct to an Access Point (AP) of a wireless LAN). ...
doi:10.1145/605991.605994
dblp:conf/wowmom/Radha01
fatcat:n5dtagq5gvbsxpsicdv45ryt7m
TranScaling
2001
Proceedings of the 4th ACM international workshop on Wireless mobile multimedia - WOWMOM '01
We argue that an Internet/wireless network gateway represents a good candidate for performing transcaling. ...
With transcaling, a scalable video stream, that covers a given bandwidth range, is mapped into one or more scalable video streams covering different bandwidth ranges. ...
TransScaling can be supported at gateways between the wired Internet and wireless/mobile access networks (e.g., at a proxy server adjunct to an Access Point (AP) of a wireless LAN). ...
doi:10.1145/605992.605994
fatcat:ck74zvy3pbcdfikm4wppocjl4i
ANALISIS KEAMANAN WIRELESS LAN PADA JARINGAN DENGAN AUTENTIKASI CAPTIVE PORTAL
2019
Buffer Informatika
The software is used on laptops at a distance of 5m to 25m from the Wireless LAN access point. ...
AbstrakPenelitian ini membahas tentang analisis keamanan Wireless LAN (Wireless Local Area Network) terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private ...
Protokol keamanan
Wireless LAN yang digunakan dalam penelitian
yaitu Wireless Protected Access (WPA), Web
Proxy, dan Virtual Private Network (VPN). ...
doi:10.25134/buffer.v5i1.1956
fatcat:lv5u27kl7jcmfeykbmor3vgfxm
Survey Of Fault Detection Algorithm In Wsn
2017
Zenodo
Based on their independence from accessible infrastructures, wireless sensor networks can be deploy in virtually any location and provide sensor samples in a spatial and temporal resolution ...
Also, a progress in microelectronic fabrication technology reduces cost of developed portable wireless sensor nodes. ...
and thus allows to get rid of the need to pull cable through walls and ceilings. Scalability: Wireless LAN systems can be configured in many different types of topologies to fulfil the needs of particular ...
doi:10.5281/zenodo.583910
fatcat:yx4s2gkkhrcsxl7twjqjealczy
Comparing wireless networks for applying digital textbook
2014
Telecommunications Systems
At present, it is believed that wireless LAN was selected for the digital textbook in Korea because it provides a better data rate and greater cost-effectiveness than the other wireless network technologies ...
However, wireless LAN is inferior to the other technologies in terms of mobility and security. ...
First, wireless LAN enables a wireless Internet access
service that guarantees low-speed mobility (i.e. walking
speed). ...
doi:10.1007/s11235-013-9748-4
fatcat:na27iaj66zfjjmcj4iwgmmrz24
Effective Algorithm for Augmented Security Aware Wireless Environment using Dynamic Cryptography
2016
Indian Journal of Science and Technology
Objectives: To propose, devise and implement a novel and effective approach for dynamic cryptography based security in the wireless environment. ...
Methods/Statistical Analysis: The implementation is done based on the dynamic formation of wireless environment and further simulation of assorted wireless nodes. ...
/ Standard
Classical
Frequency
(GHz)
Modulation
802.11
(Wireless LAN)
2.4
DSSS, FHSS
802.11 a
(Wireless LAN)
5
OFDM
802.11 b
(Wireless LAN)
2.4
DSSS
802.11 g
(Wireless LAN) ...
doi:10.17485/ijst/2016/v9i44/100870
fatcat:yy6tcj2dwvfvng35czotrtzegq
IP Routing and Mobility
[chapter]
2001
Lecture Notes in Computer Science
In that respect, the solution has to be incrementally scalable to handle a large number of mobile users and wide geographical scopes, and well performing so as to support all application requirements including ...
In particular, we propose the use of extended local area networks and protocols for efficient and scalable mobility support in the Internet. ...
Wireless cells are connected to LAN switches in a hierarchical fashion. ...
doi:10.1007/3-540-45400-4_19
fatcat:sc7epj7mqbh5rl463wh5keapqa
ANALISIS KEAMANAN JARINGAN WIRELESS LAN (WLAN) PADA PT. PLN (PERSERO) WILAYAH P2B AREA SORONG
2015
Electro Luceat
Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. ...
PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat ...
Protokol keamanan Wireless LAN yang digunakan dalam penelitian yaitu Wireless Protected Access (WPA), Web Proxy dan Virtual Private Network (VPN). ...
doi:10.32531/jelekn.v1i1.15
fatcat:qsavpgkmjzelvijrlthq2n2qiu
Efficiency Consideration for Data Packets Encryption within Wireless VPN Tunneling for Video Streaming
2012
International Journal of Computers Communications & Control
A solution for QoS and data confidentiality is Virtual Private Network (VPN); ways, in which we can reduce operational costs, grow productivity, simplify network topology and extend the area of connectivity ...
This paper presents an analysis of different protocols used and the way that video data packets are encapsulated and encrypted for a high level of QoS in a VPN connection. ...
VPN security solution offers two major advantages: network scalability and a low implementation cost. ...
doi:10.15837/ijccc.2013.1.177
fatcat:klny2trhjbfitlnsiit6ka475u
« Previous
Showing results 1 — 15 out of 5,983 results