Home » Dissertations » Dissertation proposal defense powerpoint youtube downloader

Dissertation proposal defense powerpoint youtube downloader

Transcript and Presenter’s Notes

Title: Thesis Proposal Defense

1
Thesis Proposal Defense
Performance and Reassurance in the Distributed
Wireless Networking Atmosphere
Committee Dr. Andrew Yang Dr. Alfredo
Perez-Davila Ms. Wei Ding

  • Presented by
  • Karthik Sadasivam

2
Motivation and Background

  • Wireless systems are employed in just about any
    organization today
  • Newest fashion in wireless systems is pervasive
    and ubiquitous computing serving both
    nomadic and glued users anytime and anywhere
  • 802.11 or Wi-fi standards for Wireless Local
    Area Systems ( 802.11a, 802.11b, 802.11g,
    802.11i) is most generally present in enterprises
    today
  • Distributed wireless systems are deployed round the
    wide geographic area and contain mobile
    clients and base stations
  • Two factors of prime importance of these systems
    Performance and Security
  • Achieving an ideal balance between both of these
    factors such systems is definitely an ongoing research
    problem

3
Wireless Systems A Taxonomy

  1. Single-hop cellular systems
  1. Multi-hop cellular systems
  1. Random systems

4
Wireless Neighborhood Systems (WLANs)

  • A Hidden Lan includes a set
    of mobile clients contacting an access
    point (AP).
  • IEEE 802.11 – adopted worldwide standard for
    wireless LANs
  • Transmission speeds not the same as 1 Mbps to 54
    Mbps both in the two.4 GHz or 5 GHz frequency
    bands
  • Various standards for IEEE 802.11 802.11a,
    802.11b, 802.11g, 802.11i
  • 802.11 protocol has been seen to obtain vulnerable
    to several types of attacks for example DoS, WEP key
    vulnerability, rogue APs

5
Ultra WideBand (UWB) Systems

  • Latest standard to get the best speed wireless systems
    (200-400 Mbps range)
  • It truly does work impulsively radio (short pulses of
    picoseconds duration) as opposed to carrier based
    radio
  • US FCC has allotted a spectrum between 3.1 and
    10.6 GHz
  • Initially it had been present in radar communications
  • Current research targets the introduction of
    Physical and greater layer protocols because of its use
    in WPANs and WMANs (IEEE 802.15 group for WPANs
    for PHY layer)

Dissertation proposal defense powerpoint youtube downloader for example rogue access



6
Distributed Wireless Systems

  • Usage Scenarios enterprise-wide wireless
    network management, Battlefield, geographic
    survey operations, search and save operations

7
Typical Configurations

  • Fixed Entrance – Single Hop Systems
  • Fixed path mobile clients

8
Typical Configurations (contd.)

  • Fixed Entrance – Single Hop Systems
  • Variable path (roaming) mobile clients

9
Typical Configurations (contd.)

  • Mobile Access points Multi Hop Systems

10
Performance Factors

  • Listed here are factors which affect
    performance of wireless systems generally
  • Amount of nodes Since bandwidth is shared
    equally of nodes, the performance and
    throughput decreases fat loss nodes type in the
    network
  • The specific protocol Each layer within the
    TCP/IP protocol suite adds a distinctive header, which
    features a inclination to alter the performance significantly.
  • The topology In situation in the dynamically altering
    topology (for instance, in random systems), the
    nodes need to maintain routing tables, that have
    to obtain recalculated every time a node leaves a
    current network and enters a totally new network

11
Performance Factors (contd.)

  • Fixed Entrance – Single Hop Systems
  • In addition for that factors as listed above, the
    following factors are specific to these kinds of
    systems
  • Within the situation of fixed path clients, the region
    within the clients inside the entrance plays an
    component in working the performance
  • Within the situation of roaming mobile clients.
    re-authentication is required whenever a client
    moves from selecting a one entrance to
    enter all of the different another entrance (referred to as
    handoff)

Dissertation proposal defense powerpoint youtube downloader way to behave new



12
Performance Factors (contd.)

  • Performance in Mobile Entrance – Multi Hop
    Systems
  • The next factors happen to be located to affect
    the performance of multi hop wireless systems-
  • Routing protocols Many of the routing protocols
    helpful for random systems demand considerable
    bandwidth and power
  • Node speed With rise in node mobility, the
    routing overhead along with the bit error rate increases
  • Traffic sources In multi hop systems, the
    method of getting traffic keeps different constantly. In the
    particular instant of energy, once we consider the
    bandwidth for your traffic source, it might
    not remain constant a duration of time because the
    topology changes.

13
Performance Metrics

  • Measurement of performance within the wireless network
    involves many interdependent factors. We consider
    the packet-level metrics just for sake of
    simplicity
  • Finish-to-Finish Throughput – Approach to calculating the amount of
    packets effectively transmitted for final
    destination per unit time.
  • Finish-to-Finish Delay – Average time a packet requires to
    achieve its destination
  • Link Utilization – Extended term proportion of energy
    or probability there are transmission across the
    link.
  • Packet Loss – Ratio of transmitted packets that
    might have been discarded or lost within the
    network.

.

14
Security issues

  • Within the distributed wireless network made up of
    both wireless and wired segments, the threat to
    the network is bending.
  • A few in the threats are common to both wireless
    and wired systems for example-
  • invasion and resource stealing
  • traffic redirection
  • Denial and services information (DoS)
  • Most people are specific to wireless systems for example
    Rogue APs, WEP key vulnerability, MAC address
    spoofing, etc.
  • Random systems introduce more security issues in
    routing because there are no natural security
    mechanisms.

.

15
Security issues (contd.)

  • Authentication is among the most significant
    security issues for distributed wireless
    systems. Listed here are kinds of
    authentication methods used
  • Mutual authentication Both authenticator
    along with the user must manage to mutually
    authenticate one another, to avoid
    threats for example rogue access points.
  • Self-protecting A hidden node must safeguard
    itself from eavesdropping and impersonation
  • Protected against dictionary attacks
  • Secure session keys – Session keys provide
    message authentication, confidentiality and
    integrity for the user session.
  • User-level authentication
  • Fast re-authentication essential in the issue of
    roaming clients

.

16
Security issues (contd.)

  • Classification of Authentication methods
  • Certificate based methods Such methods use
    public key infrastructure (PKI) to authenticate
    users. E.g PEAP and EAP
  • Disadvantage
  • price of administration
  • provides device authentication as opposed to
    user-level authentication
  • Password based methods They originate from
    password authentication mechanism. E.g Ciscos
    LEAP
  • Disadvantage
  • weaker to attacks like the
    Man-in-the-Middle (MITM)

.

17
Security issues (contd.)

  • Reassurance in Fixed Entrance – single hop
    systems
  • Reauthentication could be a major problem such
    systems
  • centralized certificate-based authentication
    (RADIUS)
  • Authentication Way of example EAPOL (EAP over
    LAN) used

18
Security issues (contd.)

  • Reassurance in Mobile Entrance Multi Hop
    Systems
  • Inter-Entrance authentication essential for
    this situation. Inter Entrance Protocol can be utilized
    for this reason
  • Reassurance in routing between mobile hosts-
  • No centrally administered secure routers
  • No strict security policies
  • Highly dynamic nature of MANETs
  • Current random protocols trust all participating
    nodes.

19
Research Plan

  • The study into performance may be
    simulation-based
  • An exam of countless factors affecting the
    performance will probably be performed and a lot of important ones
    will most likely be derived
  • Test cases will most likely be attracted of individuals factors
  • The main security issues in distributed systems
    will most likely be used along with the impact of individuals across the
    performance will most likely be examined
  • The outcome within the security and gratification
    analysis easily available cases will most likely be aggregated and
    when compared with uncover the tradeoffs between these
    two factors, to make certain that the perfect solution might be
    achieved.

20
Methods and instrumentation

  • Hardware
  • Pentium IV or greater machine with 512 MB RAM and
    wireless network adapter
  • ‘cisco’ Wireless Entrance
  • Software
  • Os’s Home home home windows 2K/ XP, Linux
  • Network simulators
  • Ns-2
  • OPNET
  • Programming platform Java SDK 1.4.2
  • ‘cisco’ Aironet client utility (ACU)

21
Acknowledgements
My sincere because of Dr. Andrew Yang for his
guidance and support along with the NSF for funding my
position
22
Thanks!

  • Questions?

PowerShow.com could be a leading presentation/slideshow discussing website. When the application is business, how-to, education, medicine, school, church, sales, marketing, online training or entertainment, PowerShow.com is a great resource. And, on top of this, almost all its awesome features is free of charge and simple to use.

You should utilize PowerShow.com to uncover and download example online PowerPoint ppt presentations on almost any subject imaginable so that you can learn to improve your own slides and presentations free of charge. Or apply it to uncover and download high-quality how-to PowerPoint ppt presentations with highlighted or animated slides which will educate you the way some factor new, additionally free. Or apply it to upload your own personal PowerPoint slides so that you can share all of them your teachers, class, students, bosses, employees, customers, potential investors or possibly the planet. Or apply it to produce really awesome photo slideshows – with 2D and 3D transitions, animation, and selecting a music – you can tell your Facebook buddies or Google+ circles. That’s all free too!

For his or her fee you are getting the industry’s best online privacy or freely promote your presentations and slide shows wealthy in the search engines rankings. But furthermore compared to that it’s free. We’ll even convert your presentations and slide shows towards the universal Flash format wonderful their original multimedia glory, including animation, 2D and 3D transition effects, embedded music or any other audio, or even video part of slides. All free of charge. Many of the presentations and slideshows on PowerShow.com can watch, nearly all are free of charge to download. (You might decide should you allow people to download your original PowerPoint presentations and photo slideshows for their fee reely or by no means.) Take a look at PowerShow.com today – free of charge. There’s truly something for everybody!

presentations free of charge. Or apply it to uncover and download high-quality how-to PowerPoint ppt presentations with highlighted or animated slides which will educate you the way some factor new, additionally free. Or apply it to upload your own personal PowerPoint slides so that you can share all of them your teachers, class, students, bosses, employees, customers, potential investors or possibly the planet. Or apply it to produce really awesome photo slideshows – with 2D and 3D transitions, animation, and selecting a music – you can tell your Facebook buddies or Google+ circles. That’s all free too!

For his or her fee you are getting the industry’s best online privacy or freely promote your presentations and slide shows wealthy in the search engines rankings. But furthermore compared to that it’s free. We’ll even convert your presentations and slide shows towards the universal Flash format wonderful their original multimedia glory, including animation, 2D and 3D transition effects, embedded music or any other audio, or even video part of slides. All free of charge. Many of the presentations and slideshows on PowerShow.com can watch, nearly all are free of charge to download. (You might decide should you allow people to download your original PowerPoint presentations and photo slideshows for their fee reely or by no means.) Take a look at PowerShow.com today – free of charge. There’s truly something for everybody!


Share this:
custom writing low cost
Order custom writing

ads