805 resultados para Wireless Network


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper discusses the RFID implants for identification via a sensor network. Brain-computer implants linked in to a wireless network. Biometric identification via body sensors is also discussed. The use of a network as a means for remote and distance monitoring of humans opens up a range of potential uses. Where implanted identification is concerned this immediately offers high security access to specific areas by means of only an RFID device. If a neural implant is employed then clearly the information exchanged with a network can take on a much richer form, allowing for identification and response to an individual's needs based on the signals apparent on their nervous system.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Information architecture (IA) is defined as high level information requirements of an organisation. It is applied in areas such as information systems development, enterprise architecture, business processes management and organisational change management. Still, the lack of methods and theories prevents information architecture becoming a distinct discipline. Healthcare organisation is always seen as information intensive organisation, moreover in a pervasive healthcare environment. Pervasive healthcare aims to provide healthcare services to anyone, anywhere and anytime by incorporating mobile devices and wireless network. Information architecture hence plays an important role in information provisioning within the context of pervasive healthcare in order to support decision making and communication between clinician and patients. Organisational semiotics is one of the social technical approaches that contemplate information through the norms or activities performed within an organisation prior to pervasive healthcare implementation. This paper proposes a conceptual design of information architecture for pervasive healthcare. It is illustrated with a scenario of mental health patient monitoring.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network. Vulnerability tests were conducted sequentially, when data from the survey was needed to continue the scan.A survey of the network was done and data in the form of operating system, among other things, were collected in the tables. A number of systems were selected from the tables and were scanned with Nessus. The result was a table across the network and a table of found vulnerabilities. The table of vulnerabilities has helped the organization to prevent these vulnerabilities by updating the affected computers. Also a wireless network with WEP encryption, which is insecure, has been detected and decrypted.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O telefone celular teve uma grande evolução nos últimos anos, o que antes era utilizado exclusivamente para transmissão de voz, hoje tem características avançadíssimas incluindo várias evoluções tecnológicas. Dentro deste aspecto, a inovação que o LTE (Long Term Evolution) vem demonstrando em suas características realmente se destacam em relação as tecnologias que a antecederam e representa grande evolução se comparada com as outras. Foi desenvolvida no âmbito do projeto 3GPP e (3rd Generation Partners Project) promovido pelo Instituto Europeu de Normalização na área de Telecomunicações ETSI (European Telecommunications Standard Institute). As operadoras que demonstram interesse em disponibilizar esta tecnologia buscam introduzir a flexibilidade do LTE para ir ao encontro dos objetivos de suas redes existentes, espectro e negócios para banda larga móvel e serviços multimídia. O LTE promete taxas de download de 326,4Mbps, taxas de upload de 86,4Mbps, RTT ( ROUND TRIP TIME ) menos de 10 mile segundos e raio das células podendo atingir até 100km. O sistema 4G (LTE) é um sistema integrado completamente baseado em IP, que é resultado de tecnologias conectadas por fios e sem fios disponibilizando um custo acessível, atendendo as exigências de uma rede de comunicação (Wireless), serviços de transferência de mensagens multimídias, conversa com vídeo, televisão móvel de alta definição, serviços mínimos como voz e dados entre outras vantagens. Desta forma, este estudo tem por objetivo analisar quais são as oportunidades e os desafios no mercado de telefonia móvel de Telecomunicações ao implantar o sistema de tecnologia LTE demonstrando o benefício dos fabricantes e operadoras no sentido econômico e tecnológico.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis proposes the specification and performance analysis of a real-time communication mechanism for IEEE 802.11/11e standard. This approach is called Group Sequential Communication (GSC). The GSC has a better performance for dealing with small data packets when compared to the HCCA mechanism by adopting a decentralized medium access control using a publish/subscribe communication scheme. The main objective of the thesis is the HCCA overhead reduction of the Polling, ACK and QoS Null frames exchanged between the Hybrid Coordinator and the polled stations. The GSC eliminates the polling scheme used by HCCA scheduling algorithm by using a Virtual Token Passing procedure among members of the real-time group to whom a high-priority and sequential access to communication medium is granted. In order to improve the reliability of the mechanism proposed into a noisy channel, it is presented an error recovery scheme called second chance algorithm. This scheme is based on block acknowledgment strategy where there is a possibility of retransmitting when missing real-time messages. Thus, the GSC mechanism maintains the real-time traffic across many IEEE 802.11/11e devices, optimized bandwidth usage and minimal delay variation for data packets in the wireless network. For validation purpose of the communication scheme, the GSC and HCCA mechanisms have been implemented in network simulation software developed in C/C++ and their performance results were compared. The experiments show the efficiency of the GSC mechanism, especially in industrial communication scenarios.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ensuring the dependability requirements is essential for the industrial applications since faults may cause failures whose consequences result in economic losses, environmental damage or hurting people. Therefore, faced from the relevance of topic, this thesis proposes a methodology for the dependability evaluation of industrial wireless networks (WirelessHART, ISA100.11a, WIA-PA) on early design phase. However, the proposal can be easily adapted to maintenance and expansion stages of network. The proposal uses graph theory and fault tree formalism to create automatically an analytical model from a given wireless industrial network topology, where the dependability can be evaluated. The evaluation metrics supported are the reliability, availability, MTTF (mean time to failure), importance measures of devices, redundancy aspects and common cause failures. It must be emphasized that the proposal is independent of any tool to evaluate quantitatively the target metrics. However, due to validation issues it was used a tool widely accepted on academy for this purpose (SHARPE). In addition, an algorithm to generate the minimal cut sets, originally applied on graph theory, was adapted to fault tree formalism to guarantee the scalability of methodology in wireless industrial network environments (< 100 devices). Finally, the proposed methodology was validate from typical scenarios found in industrial environments, as star, line, cluster and mesh topologies. It was also evaluated scenarios with common cause failures and best practices to guide the design of an industrial wireless network. For guarantee scalability requirements, it was analyzed the performance of methodology in different scenarios where the results shown the applicability of proposal for networks typically found in industrial environments

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The monitoring of patients performed in hospitals is usually done either in a manual or semiautomated way, where the members of the healthcare team must constantly visit the patients to ascertain the health condition in which they are. The adoption of this procedure, however, compromises the quality of the monitoring conducted since the shortage of physical and human resources in hospitals tends to overwhelm members of the healthcare team, preventing them from moving to patients with adequate frequency. Given this, many existing works in the literature specify alternatives aimed at improving this monitoring through the use of wireless networks. In these works, the network is only intended for data traffic generated by medical sensors and there is no possibility of it being allocated for the transmission of data from applications present in existing user stations in the hospital. However, in the case of hospital automation environments, this aspect is a negative point, considering that the data generated in such applications can be directly related to the patient monitoring conducted. Thus, this thesis defines Wi-Bio as a communication protocol aimed at the establishment of IEEE 802.11 networks for patient monitoring, capable of enabling the harmonious coexistence among the traffic generated by medical sensors and user stations. The formal specification and verification of Wi-Bio were made through the design and analysis of Petri net models. Its validation was performed through simulations with the Network Simulator 2 (NS2) tool. The simulations of NS2 were designed to portray a real patient monitoring environment corresponding to a floor of the nursing wards sector of the University Hospital Onofre Lopes (HUOL), located at Natal, Rio Grande do Norte. Moreover, in order to verify the feasibility of Wi-Bio in terms of wireless networks standards prevailing in the market, the testing scenario was also simulated under a perspective in which the network elements used the HCCA access mechanism described in the IEEE 802.11e amendment. The results confirmed the validity of the designed Petri nets and showed that Wi-Bio, in addition to presenting a superior performance compared to HCCA on most items analyzed, was also able to promote efficient integration between the data generated by medical sensors and user applications on the same wireless network

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wireless sensors and actuators Networks specified by IEEE 802.15.4, are becoming increasingly being applied to instrumentation, as in instrumentation of oil wells with completion Plunger Lift type. Due to specific characteristics of the environment being installed, it s find the risk of compromising network security, and presenting several attack scenarios and the potential damage from them. It`s found the need for a more detailed security study of these networks, which calls for use of encryption algorithms, like AES-128 bits and RC6. So then it was implement the algorithms RC6 and AES-128, in an 8 bits microcontroller, and study its performance characteristics, critical for embedded applications. From these results it was developed a Hybrid Algorithm Cryptographic, ACH, which showed intermediate characteristics between the AES and RC6, more appropriate for use in applications with limitations of power consumption and memory. Also was present a comparative study of quality of security among the three algorithms, proving ACH cryptographic capability.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Wireless sensor networks are reality nowadays. The growing necessity of connectivity between existing industrial plant equipments pushes the research and development of several technologies. The IEEE 802.15.4 LR-WPAN comes as a low-cost and powersaving viable solution, which are important concerns while making decisions on remote sensoring projects. This study intends to propose a wireless communication system which makes possible the monitoring of analogic and/or digital variables (i. e., the pressure studied) involved on the artificial methods for oil and gas lifting. The main issues are: To develop a software based on SMAC Standard in order to create a wireless network to monitoring analogic and/or digital variables; To evaluate the communication link based on the number of lost packets tested in different environments (indoor and outdoor) and To propose an instrumentation system consisting of wireless devices

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Due to the constantly increasing use of wireless networks in domestic, business and industrial environments, new challenges have emerged. The prototyping of new protocols in these environments is typically restricted to simulation environments, where there is the need of double implementation, one in the simulation environment where an initial proof of concept is performed and the other one in a real environment. Also, if real environments are used, it is not trivial to create a testbed for high density wireless networks given the need to use various real equipment as well as attenuators and power reducers to try to reduce the physical space required to create these laboratories. In this context, LVWNet (Linux Virtual Wireless Network) project was originally designed to create completely virtual testbeds for IEEE 802.11 networks on the Linux operating system. This paper aims to extend the current project LVWNet, adding to it the features like the ability to interact with real wireless hardware, provides a initial mobility ability using the positioning of the nodes in a space coordinates environment based on meters, with loss calculations due to attenuation in free space, enables some scalability increase by creating an own protocol that allows the communication between nodes without an intermediate host and dynamic registration of nodes, allowing new nodes to be inserted into in already in operation network

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper presents an Advanced Traveler Information System (ATIS) developed on Android platform, which is open source and free. The developed application has as its main objective the free use of a Vehicle-to- Infrastructure (V2I) communication through the wireless network access points available in urban centers. In addition to providing the necessary information for an Intelligent Transportation System (ITS) to a central server, the application also receives the traffic data close to the vehicle. Once obtained this traffic information, the application displays them to the driver in a clear and efficient way, allowing the user to make decisions about his route in real time. The application was tested in a real environment and the results are presented in the article. In conclusion we present the benefits of this application. © 2012 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Esta tese apresenta uma metodologia para avaliação de desempenho de redes de acesso banda larga. A avaliação de desempenho de redes é uma forma de identificar e analisar como determinadas características tais como diferentes tipos de tráfego ou formas de utilização, por exemplo, podem influenciar no comportamento da rede em foco, podendo assim prever como tal rede se comportará frente a situações futuras. A metodologia apresentada é composta de duas abordagens: uma abordagem baseada em medições e outra baseada em modelagem via processos Markovianos. As redes analisadas englobam os dois tipos básicos de arquitetura de acesso: redes ADSL2+ (linha digital do assinante assimétrica 2+ – Asymmetric Digital Subscriber Line 2+), as quais são redes cabeadas que utilizam cabos metálicos de pares trançados; redes FBWN (rede sem fio banda larga fixa – Fixed Broadband Wireless Network), as quais são redes sem fio (wireless) baseadas no padrão IEEE 802.16. A abordagem de medições é focada na forma como a rede analisada se comporta frente a três situações: transmissão de um tráfego genérico; impacto de ruídos não-estacionários no sistema; e uso da rede como meio de transmissão de tráfego multimídia em tempo real. A abordagem de modelagem, por sua vez, ´e baseada em prever o comportamento das redes analisadas utilizando uma formulação matemática fundamentada em processos Markovianos. Os resultados apresentados indicam a viabilidade de aplicação desta metodologia como forma de avaliação de desempenho. Os resultados ainda tornam possível a extensão desta metodologia a outros tipos de redes de acesso banda larga, tais como: redes de fibras ópticas, redes de enlaces de microondas, redes VDSL/VDSL2 (linha digital do assinante de alta taxa de dados – Very-high-data-rate DSL), etc.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mensurar os impactos do tráfego de aplicações interativas para TV Digital nas redes sem fio de 4a geração em especial WIMAX e femtocell tem sido um grande desafio para pesquisadores em todo o mundo, o teste destas tecnologias se mostra promissora para a melhor qualidade de serviço prestado pelas operadoras. Inicialmente, identificando o padrão de tráfego de rede através da aferição e caracterização de tráfego de uma aplicação interativa de TV Digital do Sistema Brasileiro de TV Digital (SBTVD). A partir de então, as simulações são feitas sobre uma rede sem fio. Para este estudo, a rede WiMAX foi escolhida como um de nossos estudo de caso. Um estudo dos impactos do uso desta aplicação em uma WMAN (Wireless Metropolitan Área Network) com WiMAX e também utilizando femtocells. Evidentemente, tecnologias sem fio apresentam uma grande variação da qualidade do sinal. Deste modo, é necessário utilizar uma solução para reduzir essa degradação no sinal. Dentre as possíveis soluções, o uso de femtocells surge como alternativa viável para estas melhorias, lembrando que uso de femtocell esta diretamente ligado para áreas onde o sinal é zero ou muito baixo. A utilização de simulações discretas através de ferramentas apropriadas como o OPNET, se mostram bastante úteis para viabilizar a utilização das tecnologias existentes, expondo-as a condições mais adversas de fluxo, carga , numero de usuários e distancias que certamente influenciam no desempenha de cada uma delas.