867 resultados para Wi-Fi scansione netlink kernel Linux mac80211
Resumo:
Nos últimos anos temos assistido ao aparecimento de novos dispositivos inteligentes e sistemas de automação residencial. Com o objetivo de conectar e controlar equi- pamentos eletrónicos, dentro de uma habitação, existe a necessidade de desenvolver soluções integradas de controlo remoto. Os smartphones, apresentam todas as carac- terísticas, poder computacional e portabilidade, ideais para controlo e monitorização deste tipo de dispositivos. Quando se considera o desenvolvimento de um produto novo e dependendo do problema, escolher a abordagem e tecnologias mais adequadas nem sempre é fácil. Este projeto apresenta um conjunto de tecnologias e soluções de controlo baseadas em arquiteturas móveis. Para prova de conceito, e baseado num sistema real (IVIT), é proposta uma solução inovadora usando um smartphone. O IVIT, desenvolve uma tecnologia para aplicar num reservatório de aquecimento de água de inércia variável, com funcionalidades de monitorização, controlo e operação colaborativa do sistema de aquecimento. Os resultados obtidos comprovaram que o desempenho da aplicação ultrapassou as expectativas e que a solução proposta é uma alternativa viável para o controlo de dispositivos para automação residencial usando smartphones.
Resumo:
Tutkielman tavoitteena on esitellä esineiden internetin kokonaisuutta ja tutkia siellä käytettäviä langattomia verkkostandardeja sekä niiden käyttöä älykodissa. Esineiden internetin soveltamisalueet jakautuvat älykodin, teollisuuden ja yhteiskunnan osa-alueisiin. Näistä älykotia käsitellään tutkielmassa tarkemmin. Työssä selvitetään, mitkä ovat esineiden internetin yleisimmät langattomat verkkostandardit ja niiden ominaisuudet. Lisäksi selvitetään, mistä osista älykoti koostuu, mitkä ovat soveltamisalueet ja miten älykoti toimii. Vertailukohteina käytetään kahden suuren elektroniikkavalmistajan, Samsungin ja LG:n, älykotiratkaisuja. Tutkielmassa esitellään esineiden internetin määritelmä, sen historiaa ja käyttökohteita, jotta saadaan yleiskuva esineiden internetin kokonaisuudesta. Tämän jälkeen syvennytään langattomiin verkkostandardeihin, jotka ovat keskeisesti käytössä esineiden internetissä. Kyseiset verkkostandardit ovat Bluetooth, Bluetooth Low Energy, NFC, Wi-Fi, Zigbee ja 6LoWPAN. Lopuksi käsitellään älykotia ja sen ominaisuuksia. Samalla tutkitaan Samsungin ja LG:n älykotilaitteita ja pohditaan niiden toimivuutta. Lisäksi pohditaan verkkostandardien käyttöä älykodeissa sekä esineiden internetin ja älylaitteiden vaikutuksia ihmisiin. Lopputuloksena todetaan, että Wi-Fi, Bluetooth ja Zigbee ovat yleisimmät älykodin verkkostandardit ja että ainoastaan yksi verkkostandardi ei tällä hetkellä riitä monipuolisen älykodin kaikkia toimintoja varten. Vertailussa huomataan Samsungin älykotiratkaisun olevan kehityksessä LG:tä edellä.
Resumo:
Nowadays there is a huge evolution in the technological world and in the wireless networks. The electronic devices have more capabilities and resources over the years, which makes the users more and more demanding. The necessity of being connected to the global world leads to the arising of wireless access points in the cities to provide internet access to the people in order to keep the constant interaction with the world. Vehicular networks arise to support safety related applications and to improve the traffic flow in the roads; however, nowadays they are also used to provide entertainment to the users present in the vehicles. The best way to increase the utilization of the vehicular networks is to give to the users what they want: a constant connection to the internet. Despite of all the advances in the vehicular networks, there were several issues to be solved. The presence of dedicated infrastructure to vehicular networks is not wide yet, which leads to the need of using the available Wi-Fi hotspots and the cellular networks as access networks. In order to make all the management of the mobility process and to keep the user’s connection and session active, a mobility protocol is needed. Taking into account the huge number of access points present at the range of a vehicle for example in a city, it will be beneficial to take advantage of all available resources in order to improve all the vehicular network, either to the users and to the operators. The concept of multihoming allows to take advantage of all available resources with multiple simultaneous connections. This dissertation has as objectives the integration of a mobility protocol, the Network-Proxy Mobile IPv6 protocol, with a host-multihoming per packet solution in order to increase the performance of the network by using more resources simultaneously, the support of multi-hop communications, either in IPv6 or IPv4, the capability of providing internet access to the users of the network, and the integration of the developed protocol in the vehicular environment, with the WAVE, Wi-Fi and cellular technologies. The performed tests focused on the multihoming features implemented on this dissertation, and on the IPv4 network access for the normal users. The obtained results show that the multihoming addition to the mobility protocol improves the network performance and provides a better resource management. Also, the results show the correct operation of the developed protocol in a vehicular environment.
Resumo:
Esta tese consiste no estudo, implementação e desenvolvimento da infra-estrutura para o projecto SEMCABO-WIFI. Este projecto está inserido na empresa Sem¬ Cabo, com o objectivo de levar a Internet aos clientes sob a forma de hotspots ou no acesso à ultima milha (Last Míle Access) à casa dos residentes. O projecto também deu origem à própria empresa, levando esta a ISP desde Setembro de 2007. Numa primeira fase, é feita abordagem a Sistemas de Authentícatíon, Authorization e Accountíng para ISPs, na vertente WI-FI e apresentadas possíveis soluções comercias e open source. Em seguida, é apresentado a empresa SemCabo, vertente comercial e tecnológica. O sistema base da SemCabo é referido, contemplando a tecnologia de suporte, rede, equipamentos activos, módulos de emissão de sinal WI-FI, segurança, monitorização e portal de autenticação. Os servidores base são indicados posteriormente, sendo efectuado a apresentação de todos os servidores com suporte ao projecto, incluindo alguns pormenores de configuração. São apresentados equipa mentos e sistemas utilizados para controlo de acesso à rede (NAS), sendo igualmente descritos pormenores de configuração. ABSTRACT; This thesis is about the study, implementation and development of the infrastructure created for the SEMCABO-WIFI project. This project is inserted in the company SemCabo, with the objective to bring the Internet to costumers in the form of hotspots or access in last mile to the house of residents. The project also originated the company and led the company to ISP since September 2007. ln the first fase, the approach is about Systems Authentication, Authorization and Accounting for WISPs and presented possible commercial and open source solutions. ln next, the SemCabo company is presented and described their technological and commercial aspects. The base system of the SemCabo is refered, considering the support technology, network equipment, modules emission signal WI-FI, security, monitoring and portal authentication module. Base servers of the SemCabo project are shown, a presentation of all the servers that support the project is made, including some details of the configuration. The equipment and systems used to control network access (NAS) are presented, details of configuration are also described.
Resumo:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Educação, Programa de Pós-Graduação em Educação, 2016.
Resumo:
95 p.
Resumo:
Mode of access: Internet.
Resumo:
Microfilm.
Resumo:
Microfilm.
Resumo:
Microfilm.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
This project was a step forward in developing intrusion detection systems in distributed environments such as web services. It investigates a new approach of detection based on so-called "taint-marking" techniques and introduces a theoretical framework along with its implementation in the Linux kernel.
Resumo:
The correctness of a hard real-time system depends its ability to meet all its deadlines. Existing real-time systems use either a pure real-time scheduler or a real-time scheduler embedded as a real-time scheduling class in the scheduler of an operating system (OS). Existing implementations of schedulers in multicore systems that support real-time and non-real-time tasks, permit the execution of non-real-time tasks in all the cores with priorities lower than those of real-time tasks, but interrupts and softirqs associated with these non-real-time tasks can execute in any core with priorities higher than those of real-time tasks. As a result, the execution overhead of real-time tasks is quite large in these systems, which, in turn, affects their runtime. In order that the hard real-time tasks can be executed in such systems with minimal interference from other Linux tasks, we propose, in this paper, an integrated scheduler architecture, called SchedISA, which aims to considerably reduce the execution overhead of real-time tasks in these systems. In order to test the efficacy of the proposed scheduler, we implemented partitioned earliest deadline first (P-EDF) scheduling algorithm in SchedISA on Linux kernel, version 3.8, and conducted experiments on Intel core i7 processor with eight logical cores. We compared the execution overhead of real-time tasks in the above implementation of SchedISA with that in SCHED_DEADLINE's P-EDF implementation, which concurrently executes real-time and non-real-time tasks in Linux OS in all the cores. The experimental results show that the execution overhead of real-time tasks in the above implementation of SchedISA is considerably less than that in SCHED_DEADLINE. We believe that, with further refinement of SchedISA, the execution overhead of real-time tasks in SchedISA can be reduced to a predictable maximum, making it suitable for scheduling hard real-time tasks without affecting the CPU share of Linux tasks.