4 research outputs found

    DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks

    Get PDF
    This paper describes and investigates the QoS provisioning technique used in IEEE 802.11g ad-hoc structure. This research then propose better scheme to support QoS by modifying the DCF Interframe Space (DIFS) to use new values to bias towards the high priority traffic flow and distinguish it from the low priority traffic.Simulations are done using NS-2 and the findings presented. Results showed that better throughput can be achieved to provide better traffic flows on high priority traffi

    Assessing wireless security implementation in government and private sector companies in Malacca-a case study

    Get PDF
    Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this case study was to ascertain the level of security with regards to wireless implementation in government and private sector companies in Malacca. To gauge the level of security being implemented, we conduct war driving sessions where we use certain hardware and software to map these wireless networks and then analyze their level of security in terms of whether they use encryption techniques such as WEP or WPA for data confidentiality.Simulation was done to show that some of these techniques are not secure. Then, comparisons are made between the use of open source software against vendor based software to collect and analyze the wireless networks before making several conclusions. The most alarming conclusion was that the level of awareness of wireless security among users in Malacca was still relatively low, especially in government sectors. Finally, we propose several steps that can be taken to minimize and counter problems faced when using wireless technology

    Assessing Wireless Security Implementation In Government And Private Sector Companies In Malacca – A Case Study

    Get PDF
    Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this case study was to ascertain the level of security with regards to wireless implementation in government and private sector companies in Malacca. To gauge the level of security being implemented, we conduct war driving sessions where we use certain hardware and software to map these wireless networks and then analyze their level of security in terms of whether they use encryption techniques such as WEP or WPA for data confidentiality. Simulation was done to show that some of these techniques are not secure. Then, comparisons are made between the use of open source software against vendor based software to collect and analyze the wireless networks before making several conclusions. The most alarming conclusion was that the level of awareness of wireless security among users in Malacca was still relatively low, especially in government sectors. Finally, we propose several steps that can be taken to minimize and counter problems faced when using wireless technology
    corecore