期刊文献+
共找到2,385篇文章
< 1 2 120 >
每页显示 20 50 100
Multiple Welding Seam Video Transmission and Monitoring of Welding Robot in Local Area Network 被引量:1
1
作者 马国红 杜保舟 谢芬 《Journal of Shanghai Jiaotong university(Science)》 EI 2012年第4期452-455,共4页
A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Wi... A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear. 展开更多
关键词 welding robot multi-threaded local area network lan video transmission
原文传递
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
2
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (Wlan)
原文传递
Localized Coverage Connectivity Based on Shape and Area Using Mobile Sensor Robots in Wireless Sensor Networks 被引量:1
3
作者 Rajaram Pichamuthu Prakasam Periasamy 《Circuits and Systems》 2016年第8期1962-1975,共15页
A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as... A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as battlefield inspection and biological detection. The Constrained Motion and Sensor (CMS) Model represents the features and explain k-step reach ability testing to describe the states. The description and calculation based on CMS model does not solve the problem in mobile robots. The ADD framework based on monitoring radio measurements creates a threshold. But the methods are not effective in dynamic coverage of complex environment. In this paper, a Localized Coverage based on Shape and Area Detection (LCSAD) Framework is developed to increase the dynamic coverage using mobile robots. To facilitate the measurement in mobile robots, two algorithms are designed to identify the coverage area, (i.e.,) the area of a coverage hole or not. The two algorithms are Localized Geometric Voronoi Hexagon (LGVH) and Acquaintance Area Hexagon (AAH). LGVH senses all the shapes and it is simple to show all the boundary area nodes. AAH based algorithm simply takes directional information by locating the area of local and global convex points of coverage area. Both these algorithms are applied to WSN of random topologies. The simulation result shows that the proposed LCSAD framework attains minimal energy utilization, lesser waiting time, and also achieves higher scalability, throughput, delivery rate and 8% maximal coverage connectivity in sensor network compared to state-of-art works. 展开更多
关键词 localized Coverage Wireless Senor network Automatic Detection Framework Geometric Voronoi Polygon Acquaintance area Polygons Environment Monitoring Mobile Sensor Robots
在线阅读 下载PDF
Application of Wireless Local Area Network Technology in Mobile Robot for Finned Tube Inspection
4
作者 王光荣 马培荪 +2 位作者 曹曦 孙红 李彦明 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期180-186,共7页
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The... This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080) 展开更多
关键词 boiler tubes mobile robotics wireless local area network
在线阅读 下载PDF
Research on the Teaching Reform of "Wireless Local Area Network" in the Background of"Wireless Business Circle"
5
作者 Feng Zhang 《International Journal of Technology Management》 2017年第4期74-76,共3页
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ... This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model. 展开更多
关键词 Teaching Reform Wireless local area network Wireless Business Circle.
在线阅读 下载PDF
WLAN组网架构优化模式研究
6
作者 杨俊 罗曦 樊志鹏 《移动信息》 2026年第1期22-24,共3页
文中以某高校WLAN工程建设为例,深入剖析了WLAN组网架构优化模式,包括优化背景、项目概况、优化模式及优化效果。分析表明,WLAN组网架构优化的主要模式为WLAN宏蜂窝模式、双频混合组网模式以及信号定向导入模式,优化后的架构在网络访问... 文中以某高校WLAN工程建设为例,深入剖析了WLAN组网架构优化模式,包括优化背景、项目概况、优化模式及优化效果。分析表明,WLAN组网架构优化的主要模式为WLAN宏蜂窝模式、双频混合组网模式以及信号定向导入模式,优化后的架构在网络访问速度、访问时延以及吞吐量方面表现优秀,可为WLAN组网架构优化提供参考,以满足现代局域网的实际应用和发展需求。 展开更多
关键词 无线局域网 Wlan组网架构 Wlan宏蜂窝 双频混合组网
在线阅读 下载PDF
基于local-area的Internet路由级拓扑抽象算法 被引量:4
7
作者 李乔 张兆心 《高技术通讯》 CAS CSCD 北大核心 2011年第9期922-927,共6页
通过分析Internet的本地聚集特性,给出了local-area和connect—area的定义,并基于此,为提高并行网络模拟性能,提出一种新型拓扑抽象算法——基于local—area的拓扑抽象(TABLA)算法。TABLA算法在给定的聚合粒度下,迭代搜索网络内... 通过分析Internet的本地聚集特性,给出了local-area和connect—area的定义,并基于此,为提高并行网络模拟性能,提出一种新型拓扑抽象算法——基于local—area的拓扑抽象(TABLA)算法。TABLA算法在给定的聚合粒度下,迭代搜索网络内的local-area,对拓扑进行抽象。模拟结果表明在Internet路由级拓扑上采用该算法,拓扑规模大约压缩为原先的45%,初始化内存节省约60%,模拟运行时间约缩短80%,大幅度提高了并行网络模拟性能。 展开更多
关键词 并行网络模拟 拓扑抽象 聚合粒度 本地域(local-area)
在线阅读 下载PDF
Radio map updated method based on subscriber locations in indoor WLAN localization 被引量:1
8
作者 Ying Xia Zhongzhao Zhang Lin Ma 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1202-1209,共8页
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o... With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort. 展开更多
关键词 subscriber location wireless local area network(Wlan positioning accuracy calibration effort hidden Markovmodel (HMM).
在线阅读 下载PDF
A Semi-Supervised WLAN Indoor Localization Method Based on l1-Graph Algorithm 被引量:1
9
作者 Liye Zhang Lin Ma Yubin Xu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第4期55-61,共7页
For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be colle... For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase. 展开更多
关键词 indoor location estimation l1-graph algorithm semi-supervised learning wireless local area networks(Wlan)
在线阅读 下载PDF
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
10
作者 Abdallah Elhigazi Abdallah Mosab Hamdan +6 位作者 Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih 《Computers, Materials & Continua》 SCIE EI 2023年第3期5607-5623,共17页
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ... IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection. 展开更多
关键词 802.11 media access control(MAC) wireless local area network(Wlan) artificial neural network denial-of-service(DoS)
在线阅读 下载PDF
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN
11
作者 Neena Susan Shaji Raja Muthalagu 《Digital Communications and Networks》 CSCD 2024年第6期1716-1731,共16页
Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adapt... Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adaptation is essential for wireless networks because it offers enhanced and data-intensive services.The initial intent of the SDN design was to have a physically centralized controller.However,network experts have suggested logically centralized and physically distributed designs for SDN controllers,owing to issues such as a single point of failure and scalability.This study addressed the security,scalability,reliability,and consistency issues associated with the design of distributed SDN controllers.Moreover,the security issues of an enterprise related to multiple physically distributed controllers in a software-defined wireless local area network(SD-WLAN)were emphasized,and optimal solutions were suggested. 展开更多
关键词 Software-defined networking(SDN)SDN controller Logically centralized SDN controller Physically distributed SDN controller Software-defined wireless local area network(SD-Wlan)
在线阅读 下载PDF
Multi-AP Cooperative Radio Resource Allocation Method for Co-Channel Interference Avoidance in 802.11be WLAN
12
作者 Sujie Shao Zhengpu Wang +2 位作者 Siya Xu Shaoyong Guo Xuesong Qiu 《Computers, Materials & Continua》 2025年第9期4949-4972,共24页
With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To add... With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To address this demand,deploying more access points(APs)has become an inevitable trend.While this approach enhances network coverage and capacity,it also exacerbates co-channel interference(CCI).The multi-AP cooperation introduced in IEEE 802.11be(Wi-Fi 7)represents a paradigm shift from conventional single-AP architectures,offering a novel solution to CCI through joint resource scheduling across APs.However,designing efficient cooperation mechanisms and achieving optimal resource allocation in dense AP environment remain critical research challenges.To mitigate CCI in high-density WLANs,this paper proposes a radio resource allocation method based on 802.11be multi-AP cooperation.First,to reduce the network overhead associated with centralized AP management,we introduce a distributed interference-aware AP clustering method that groups APs into cooperative sets.Second,methods for multi-AP cooperation information exchange,and cooperation transmission processes are designed.To support network state collection,capability advertisement,and cooperative trigger execution at the protocol level,this paper enhances the 802.11 frame structure with dedicated fields for multi-AP cooperation.Finally,considering the mutual influence between power and channel allocation,this paper proposes a joint radio resource allocation algorithm that employs an enhanced genetic algorithm for resource unit(RU)allocation and Q-learning for power control,interconnected via an inner-outer dual-loop architecture.Simulation results demonstrate the effectiveness of the proposed CCI avoidance mechanism and radio resource allocation algorithm in enhancing throughput in dense WLAN scenarios. 展开更多
关键词 Wireless local area network IEEE 802.11be multi-AP radio resource allocation
在线阅读 下载PDF
基于内外网协同的医院WLAN规划研究
13
作者 邢存库 《智能物联技术》 2025年第5期132-135,共4页
基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建... 基于医院多业务接入复杂性与内外网协同需求,研究无线局域网(Wireless Local Area Network,WLAN)系统的拓扑架构、接入控制、调度机制及资源优化方法。阐述面向角色的动态接入控制策略,介绍覆盖建模与容量规划方法,并在仿真平台上构建典型场景,开展协同机制与传统机制的性能对比分析。分析结果表明,所提方案在吞吐量、时延控制、信道利用效率方面具有显著优势,具备良好的工程适用性与系统可扩展性。 展开更多
关键词 医院无线网络 内外网协同 无线局域网(Wlan)规划 接入控制 容量优化
在线阅读 下载PDF
基于VSI/VXLAN隧道通信技术的油气自控网络IPv4/IPv6双栈部署与效能评估研究
14
作者 赵艺鑫 《通信电源技术》 2025年第16期142-145,共4页
随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4... 随着网络技术的持续演进,为满足日益增长的通信需求,急需对油气自控网络进行升级。基于虚拟交换实例(Virtual Switching Instance,VSI)/虚拟扩展局域网(Virtual eXtensible Local Area Network,VXLAN)隧道通信技术,开展网际互连协议第4版/网际互连协议第6版(Internet Protocol Version 4/Internet Protocol Version 6,IPv6)双栈部署与效能评估相关研究。通过确立双栈架构的设计原则与目标,构建分层网络架构,实现VSI/VXLAN隧道与IPv4/IPv6双栈架构的深度融合,完成核心网络设备与接入层网络的双栈部署,并实施安全域划分。基于多维度效能评估指标体系,采集多测点、多负载条件下的性能数据,量化评估网络的安全防护能力。实验结果表明,该方案可显著提升油气自控网络在协议兼容性、传输效率与安全性方面的综合性能,为其数字化升级提供理论支撑与实践路径。 展开更多
关键词 虚拟交换实例(VSI) 虚拟扩展局域网(VXlan) 网际互连协议第4版/网际互连协议第6版(IPv4/IPv6)双栈 油气自控网络 效能评估
在线阅读 下载PDF
基于门控循环单元的局域网络总线入侵智能检测研究
15
作者 张国志 《现代电子技术》 北大核心 2026年第2期54-58,共5页
为提高实验室局域网络总线入侵检测的时效性与准确性,设计一种基于门控循环单元的总线入侵智能检测方法。对仅包含两种状态的定性特征进行二值化处理,对包含三种或更多类别的特征,通过one-hot编码将其转换为向量特征;再对数据集进行规... 为提高实验室局域网络总线入侵检测的时效性与准确性,设计一种基于门控循环单元的总线入侵智能检测方法。对仅包含两种状态的定性特征进行二值化处理,对包含三种或更多类别的特征,通过one-hot编码将其转换为向量特征;再对数据集进行规范化调整,平衡不同量级的数据特征。为提高检测上限,使用结合聚类的欠采样算法构建平衡数据集,融合门控循环单元(GRU)与卷积神经网络(CNN)构建CNN-GRU入侵检测模型,以实现局域网络总线入侵的智能、高效检测。实验测试结果表明,在检测不同攻击时,所设计方法的Micro-F_(1)和Macro-F_(1)指标均较高,对于不同攻击的检测耗时均低于0.2 s。 展开更多
关键词 入侵检测 局域网络总线 门控循环单元 卷积神经网络 混合采样 one-hot编码
在线阅读 下载PDF
VLAN技术在校园网实验中的应用 被引量:24
16
作者 刘文杰 林乐春 +1 位作者 李凤岐 薛强 《实验技术与管理》 CAS 北大核心 2009年第3期85-87,90,共4页
虚拟局域网(VLAN)不仅可以提高网络运行的效率,而且有利于网络安全和防止网络风暴,能解决许多其他问题。第三层交换机的普及为VLAN的应用创造了条件。在实现网络构架时,采用VLAN技术可解决网络管理、扩容等问题,并可尽量发挥设备的功... 虚拟局域网(VLAN)不仅可以提高网络运行的效率,而且有利于网络安全和防止网络风暴,能解决许多其他问题。第三层交换机的普及为VLAN的应用创造了条件。在实现网络构架时,采用VLAN技术可解决网络管理、扩容等问题,并可尽量发挥设备的功能,提高网络稳定性。该文详细探讨了VLAN技术在校园网建设中的应用。 展开更多
关键词 虚拟局域网 子网 校园网 配置
在线阅读 下载PDF
Wireless-LAN安全及认证方法的研究与分析 被引量:1
17
作者 杨新宇 阳玉俭 徐庆飞 《计算机应用研究》 CSCD 北大核心 2008年第10期2889-2892,2916,共5页
首先介绍了无线局域网面临的安全问题,并对无线局域网的安全要求进行了分析;介绍了国内外Wire-less-LAN安全认证机制的研究现状,在此基础上详细分析了基于EAP的无线网络安全认证方法;最后对几种主要的认证方法进行了分析比较。
关键词 无线局域网 安全机制 认证方法 可扩展认证协议
在线阅读 下载PDF
WPAN/WLAN应用环境下基于PER的链路自适应算法 被引量:4
18
作者 钱小勇 沈连丰 +2 位作者 胡静 许国军 陈锦泰 《通信学报》 EI CSCD 北大核心 2003年第4期94-103,共10页
本文重点研究基于包错误率测量的链路自适应算法,分析了包错误率与信道参数的关系,提出了一种有别于固定门限值方案的优化门限值方案。仿真结果表明,优化门限值方案的网络吞吐量要大于固定门限值方案和基于信干比估计的链路自适应算法,... 本文重点研究基于包错误率测量的链路自适应算法,分析了包错误率与信道参数的关系,提出了一种有别于固定门限值方案的优化门限值方案。仿真结果表明,优化门限值方案的网络吞吐量要大于固定门限值方案和基于信干比估计的链路自适应算法,最大增幅可达12Mbit/s。在系统引入重传机制后,网络吞吐量将有所损失,但最大不超过1Mbit/s,相比较服务质量的提高是值得的。需指出的是,虽然分析和仿真均以HIPERLAN/2为例,但不失一般性,它们同样适合于WPAN/WLAN等类似系统。 展开更多
关键词 WPAN Wlan 链路自适应 无线个域网 无线局域网 包错误率 PER
在线阅读 下载PDF
基于预共享密钥的LAN安全关联方案改进与分析 被引量:4
19
作者 肖跃雷 武君胜 朱志祥 《计算机应用》 CSCD 北大核心 2018年第11期3246-3251,共6页
针对基于预共享密钥的有线局域网(LAN)安全关联方案中交换密钥建立过程的通信浪费问题,提出了一种改进的LAN安全关联方案。该方案通过对基于预共享密钥的鉴别及单播密钥协商过程的改进,生成了新加入交换机和认证服务器之间的成对主密钥... 针对基于预共享密钥的有线局域网(LAN)安全关联方案中交换密钥建立过程的通信浪费问题,提出了一种改进的LAN安全关联方案。该方案通过对基于预共享密钥的鉴别及单播密钥协商过程的改进,生成了新加入交换机和认证服务器之间的成对主密钥,并用于新加入交换机与各个不相邻交换机之间的交换密钥协商过程。然后,在该方案基础上提出了一种可信计算环境下的LAN安全关联方案。该方案在改进的基于预共享密钥的鉴别及单播密钥协商过程中进一步增加对终端设备的平台认证,从而实现终端设备的可信网络接入,有效增强了LAN的安全性。最后,利用串空间模型(SSM)证明了这两个LAN安全关联方案是安全的。性能对比分析结果表明,该方案有效减少了交换密钥建立过程的消息交互数和计算量。 展开更多
关键词 有线局域网 可信计算 平台认证 串空间模型 安全关联
在线阅读 下载PDF
基于IEEE802.11g标准的WLAN性能分析与测试 被引量:9
20
作者 江汉红 王征 +1 位作者 李庆 梁学俊 《武汉理工大学学报》 EI CAS CSCD 北大核心 2005年第4期86-88,92,共4页
分析了IEEE80 2 .11g标准,介绍了无线局域网的拓扑结构,构建了一个基于80 2 .11g标准的WLAN。采用网络传输率测试软件Qcheck ,通过无线到有线网络客户端、无线到无线客户端、混合网络模式的TCP传输性能和穿透性能4个方面的测试,对基于80... 分析了IEEE80 2 .11g标准,介绍了无线局域网的拓扑结构,构建了一个基于80 2 .11g标准的WLAN。采用网络传输率测试软件Qcheck ,通过无线到有线网络客户端、无线到无线客户端、混合网络模式的TCP传输性能和穿透性能4个方面的测试,对基于80 2 .11g标准的WLAN性能进行了实验验证。通过与80 2 .11b标准的性能对比。 展开更多
关键词 无线局域网 IEEE802.11G 性能测试
在线阅读 下载PDF
上一页 1 2 120 下一页 到第
使用帮助 返回顶部