9,519 research outputs found

    WiFi hot spot superdistribution : a profit scheme for WiFi access distribution

    Get PDF
    The wide-area deployment of WiFi hot spots challenges IP access providers. While new profit models are sought after by them, profitability as well as logistics for large-scale deployment of 802.11 wireless technology are still to be proven. Expenditure for hardware, locations, maintenance, connectivity, marketing, billing and customer care must be considered. Even for large carriers with infrastructure, the deployment of a large-scale WiFi infrastructure may be risky. This paper proposes a multi-level scheme for hot spot distribution and customer acquisition that reduces financial risk, cost of marketing and cost of maintenance for the large-scale deployment of WiFi hot spots

    Topology patterns of a community network: Guifi.net

    Get PDF
    This paper presents a measurement study of the topology and its effect on usage of Guifi.net, a large-scale community network. It focuses on the main issues faced by community network and lessons to consider for its future growth in order to preserve its scalability, stability and openness. The results show the network topology as an atypical high density Scale-Free network with critical points of failure and poor gateway selection or placement. In addition we have found paths with a large number of hops i.e. large diameter of the graph, and specifically long paths between leaf nodes and web proxies. The usage analysis using a widespread web proxy service confirms that these topological properties have an impact on the user experience

    Delivering real-world ubiquitous location systems

    Get PDF
    Location-enhanced applications are poised to become the first real-world example of ubiquitous computing. In this paper, we emphasize the practical aspects of getting location-enhanced applications deployed on existing devices, such as laptops, tablets, PDAs, and cell phones, without the need to purchase additional sensors or install special infrastructure. Our goal is to provide readers with an overview of the practical considerations that are currently being faced, and the research challenges that lie ahead. We ground the article with a summary of initial work on two deployments of location- enhanced computing: multi-player location-based games and a guide for the Edinburgh Festival

    Denial of service attacks and challenges in broadband wireless networks

    Get PDF
    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions
    • …
    corecore