50 research outputs found

    Distributed Resources Management in Wireless LANs

    Get PDF
    This paper introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access Points (AP). Deploying wireless LANs (WLAN) on a large scale is mainly affected by reliability, availability and performance. These parameters will be a concern for most managers who want to deploy WLANs. In order to address these concerns, a new radio resource management technique can be used in a new generation of wireless LAN equipment. This technique would include distributed dynamic channel assignment, and load sharing among Access Points (AP), which improves the network availability and reliability compared to centralized management techniques. In addition, it will help to increase network capacities and improve performance, especially in large-scale WLANs. Analysis results using normal and binomial distribution have been included which indicate an improvement of performance resulting from network balancing when implementing distributed resources management at WLANs. © 2009, IGI Global

    Analysis of distributed resource management in wireless LANs that support fault tolerance

    Get PDF
    Deploying wireless LANs (WLAN) at large scale is mainly affected by reliability, availability, and performance. These parameters will be a concern for most of managers who wanted to deploy WLANs. In order to address these concerns, new radio resource management techniques with fault tolerance can be used in a new generation of wireless LAN equipment. These techniques would include distributed dynamic channel assignment, sharing load among Access Points (AP), and supporting fault tolerance. Changing from the relatively static radio resource management techniques generally in use today to dynamic methods has been addressed in previous research article using centralized management, but it suffer from network availability problem. In [10] a new distributed management for dynamic channel assignment has been suggested. In this paper the idea has been extended to support fault tolerance, which improves the network availability and reliability compared to centralized management techniques. In addition, it will help in increasing network capacities and improve its performance especially in large-scale WLANs. The new system has been analyzed and according to binomial distribution results showed improvement of network performance compared to static load distribution

    Token-based Fast Authentication for Wireless Network

    Get PDF
    Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. The support of mobility of clients, the continuous access anywhere and anytime make WLAN preferable network for many applications. However, there are some issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. These issues are related to using the best routing algorithm to achieve good performance of throughput and delay, and to securing the open access to avoid attacks at the physical and MAC layer. IEEE 802.1x, suggested a solution to address the security issue at the MAC layer and but there are varieties of implementations address this solution and they differ in performance. IEEE 802.1af tried to address other security issue remained at the MAC layer but it is still at early stage and need verification for easy deployment. In this paper a new technique for securing wireless network using fast token-based authentication has been invented to address the vulnerability inherited by the wireless network at the MAC layer using fast authentication process. This technique is based on an authentication server distributing a security token, public authentication key, and network access key parameter to eligible mobile client MCs during registration. All messages will be encrypted during registration using temporary derived token key, but it will use derived valid token key during authentication. Authenticated MCs will then use derived group temporal key generated from the network access parameter key to encrypt all messages exchanged over the wireless network. The token, the authentication key and the access network parameter key will be only distributed during registration. This makes the security parameters known only to authentication server, authenticator and MC. Hence, this technique will protect the wireless network against attack since attackers are unable to know the token and other security keys. Moreover, it will avoid the exchange of public keys during authentication such as the one used in other existing technologies, and consequently speedup the authentication phase which is very critical to wireless technologies

    Testing the performance of wireless LAN

    Get PDF
    WLANs based on 802.11 standards are rapidly becoming popular in computer networks. Despite the advantages that have been obtained from this technology, its performance in terms of throughput, response time and security affected by many environmental factors such as distance, blockage, authentication mechanism and type of encryption used during the authentication and the data transmission. There are other security issues such as vulnerability to attack by the man-in-the-middle (MiM) attack which becomes a great concern for users and owners. However, the focus of this paper is for testing the WLAN performance under different conditions. The test results and recommendation can be used by designer and networks users to understand the limitation and how to improve the use of WLAN to optimize its capability. It is clear from the results obtained during the test, that WLAN response time is more affected by network load and very little effect by the size of encryption of WEP used in WLAN. The signal strength is very well affected by distance and blockage, which also affects the throughput. However, the throughput would be affected more with network load. © 2005 IEEE

    Organizational Knowledge Systems Design & Implementation

    Get PDF
    This research paper aims to explain relationships of   organization learning (OL), knowledge management (KM), talent management (TM) practices and organizational performance (OP) in order to have excellent understanding of the subject by using in-depth analysis of the extant literature. This research offers mechanisms for Organizational Knowledge Systems (OKS) that will help the entity to apply OKS. The research paper has created a complete mechanism of the OKS then tests the proposed model. Keywords: Organization Learning, Knowledge Management, Talent Management and Organization Knowledge Systems

    Build Innovation through Organizational Learning Capability

    Get PDF
    This research paper aims to explain the relationship between Organizational Learning (OL), and Organization Innovation (OI). The Author has used analysis of the related literatures to have deep understanding of the subject. This research offers personal mastery, systems thinking and team learning as organizational Learning Capability that will help the entity to have an innovation

    WWW (Alternate Paper Tracks) - Service Chart Diagrams º Description & Application

    Get PDF
    This paper presents an approach for the design and development of service-driven applications. These applications rely on the collaboration of multiple services that businesses offer to the external community. To ensure that the collaboration of services takes place effectively, service chart diagrams are proposed as a specication technique. These diagrams leverage the traditional state chart diagrams of UML. Furthermore, in service chart diagrams it is advocated that services do not invoke each other. However, they engage conversations before committing themselves to a composition process of services

    Design and development of an m-commerce environment: The E-CWE project

    Get PDF
    We discuss the use of software agents in the design and development of an m-commerce environment. Software agents are considered because of their features, such as autonomy, sociability, and mobility. Users are currently struggling to complete their e-commerce transactions. For instance, they have to adapt their behaviors when they browse e-commerce sites. Conducting similar transactions from wireless devices (e.g., mobile phones) requires new approaches. Multiple issues, which vary from low bandwidth and high latency to screen sizes, are raised. The E-Commerce Through Wireless Devices project aims at investigating techniques and offering solutions to support users in undertaking m-commerce transactions

    Strategic planning impact on innovation and organizational performance in the UAE

    Get PDF
    This paper aims to explain several concepts Strategic Planning (SP), Innovation (INN), and Organizational Performance (OP) to have a good understanding of the subject. The elements of different SP models may be combined to fit or meet the purpose of adopting SP in any organization. This finding makes identifying and establishing the mission and goal of an organization vital. The researchers have provided a better understanding of the SP theoretical context and helped to address the limited involvement in SP and in optimizing its benefits for OP. Literature has shown that SP has interests that may positively impact OP. However, a clear pathway for SP is needed to achieve the goal of involvement and optimization

    Software agents to support mobile services

    Get PDF
    The paper discusses mobile services (m-services) in the wireless world. This world has its own features that make it different from the wired world. For instance, new communication channels need to be used, new user-friendly services need to be suggested, and new types of computing resources need to be involved. The paper also discusses the use of software agents in addressing those features
    corecore