15,056 research outputs found
Mapping DSP algorithms to a reconfigurable architecture Adaptive Wireless Networking (AWGN)
This report will discuss the Adaptive Wireless Networking project. The vision of the Adaptive Wireless Networking project will be given. The strategy of the project will be the implementation of multiple communication systems in dynamically reconfigurable heterogeneous hardware. An overview of a wireless LAN communication system, namely HiperLAN/2, and a Bluetooth communication system will be given. Possible implementations of these systems in a dynamically reconfigurable architecture are discussed. Suggestions for future activities in the Adaptive Wireless Networking project are also given
Adaptive Wireless Networking
This paper presents the Adaptive Wireless Networking (AWGN) project. The project aims to develop methods and technologies that can be used to design efficient adaptable and reconfigurable mobile terminals for future wireless communication systems. An overview of the activities in the project is given. Furthermore our vision on adaptivity in wireless communications and suggestions for future activities are presented
Experimental Performance Analysis of Wireless Links for Healthcare Applications
Wireless networking is currently being deployed for various applications. However, the application of wireless networking in healthcare remains a challenge mainly because of security and reliability concerns. This paper presents experimental results of performance analysis of a wireless network for healthcare application in the City of Blantyre. The results show that the use of wireless networking in healthcare application will be limited by packet loss, delay and jitter when the number of hops involved in the transmission of information is large. Nevertheless, deployment of wireless networking for healthcare applications is viable when the number of hops a packet has to transverse is small.Keywords: Wireless networking; Healthcare applications; Telemedicine; E-healt
Reliability, availability and security of wireless networks in the community
Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these
wireless networks as online delivery of banking, commercial and governmental services becomes more
widespread. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case
study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of
recommendations to mitigate the threat
Matching Theory for Future Wireless Networks: Fundamentals and Applications
The emergence of novel wireless networking paradigms such as small cell and
cognitive radio networks has forever transformed the way in which wireless
systems are operated. In particular, the need for self-organizing solutions to
manage the scarce spectral resources has become a prevalent theme in many
emerging wireless systems. In this paper, the first comprehensive tutorial on
the use of matching theory, a Nobelprize winning framework, for resource
management in wireless networks is developed. To cater for the unique features
of emerging wireless networks, a novel, wireless-oriented classification of
matching theory is proposed. Then, the key solution concepts and algorithmic
implementations of this framework are exposed. Then, the developed concepts are
applied in three important wireless networking areas in order to demonstrate
the usefulness of this analytical tool. Results show how matching theory can
effectively improve the performance of resource allocation in all three
applications discussed
Wireless Networking in Libraries
Since the turn of the 21st century, libraries of almost all types have been providing clients with access to the Internet through wireless networks. In the process, wireless networking has become an important part of the continuing effort to extend access to library services through networked information technologies. The expansion of the wireless access offered by libraries, now approaching ubiquity among academic and public libraries, has been driven by a number of factors, not the least of them being the tremendous growth in the numbers of so-called “smart” devices capable of connecting to wireless networks and the parallel increases in the bandwidth available via wireless networks. Looking to the future, wireless access as provided libraries is vital to their function as public computing centers. The continued development of and improvements in mobile applications is also essential, but the construction of mobile-friendly Websites is probably far more important, given the evidence that mobile users are accessing content with increasing frequency and in progressively larger numbers. Similarly, the security and privacy of mobile applications and services must be ensured with the greatest possible vigor, inasmuch as the confidence of users is closely aligned with their continuing use of digital library resources
Will Wi-Fi Make Your Private Network Public? Wardriving, Criminal and Civil Liability, and the Security Risks of Wireless Networks
Wireless networking is growing in popularity because it is often cheaper and more convenient than other computer networking systems. Wireless networks, however, are also very hard to secure. Locating insecure wireless networks and advertising their locations is an activity known as “wardriving.” Exploiting the vulnerability of a wireless network to hack into the computer system or to monitor the wireless transmissions can give rise to liability under federal felony and misdemeanor statutes, as well as federal civil liability and liability under state law private causes of action. When introducing wireless networking into business information systems, system administrators should use all possible care to secure the network, and IT policies and practices should be updated to make sure that wireless networking risks that cannot be eliminated through technology are managed prudently
- …