English  |  正體中文  |  简体中文  |  Items with full text/Total items : 66984/66984 (100%)
Visitors : 22988722      Online Users : 711
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8038


    Title: 無線網路交握程序之預先認證方法分析與比較;a study of handoff with pre-ahthentication in wireless lan
    Authors: 吳俊孝;Chun-Hsian Wu
    Contributors: 通訊工程研究所
    Keywords: 無線區域網路;交握程序;預先認證;Handoff;Pre-Authentication;Wireless LAN
    Date: 2004-06-14
    Issue Date: 2009-09-22 11:16:27 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 近年來無線區域網路廣泛的發展,在公開的無線區域網路可提供筆記型電腦或是個人數位助理等移動元件連線使用,對於公共無線區域網路而言,有效而且可靠的認證是重要的議題,然而進行交握程序時,這些繁瑣的認證會造成潛在的延遲,甚至於影響到即時性多媒體傳輸的品質。 在本文中將使用預先認證的機制進行快速的交握程序,依據移動元件的移動特性來決定預先認證運作的方法,過程中擷取點會收集移動元件的移動資訊,利用這些資訊來決定預先認證時間以及保留認證資料時間,當預先認證的時間點到達,此擷取點將通知其他鄰近的擷取點進行認證以及保留認證資料的時間,本文中將比較不同的預先認證時間以及保留認證時間所產生的影響。在模擬結果中顯示,利用“預先認證有效率”以及“保留認證所浪費的資源”兩項參數,可以用以決定如何選擇才是最有效且最節省資源的方式,由於在本文所提出之預先認證機制中考慮了移動元件的行為模式,因此有較佳的實驗結果。 Recently, wireless LAN systems have been widely deployed for public mobile Internet services. Portable devices, such as laptop computers, Personal Digital Assistants (PDA), can access Internet services through wireless technology in wireless LAN. In the public wireless LAN systems, reliable authentication and mobility support are the most essential issues from the service point of view. However, re-authentication during handoff always causes long handoff latency and this affects the quality of service in real-time multimedia applications. In this paper, we propose a fast handoff scheme for authentication based on the predictive of mobile behavior. The prediction is made by using the behavior of the mobile devices. Thus, Access Point (AP) collects movement information of mobile devices to decide the time for pre-authentication and the time to reservation. During pre-authentication, AP will notify its neighbor APs for authentication and the time of reservation. The simulation results will illustrate the comparison of the above parameters. In this thesis, both of the authentication effectiveness and the utilization of reserved resources are used to examine the performance of the proposal schemes. As the proposed scheme considers the heuristics of mobile behavior, it demonstrates a quite good performance from our simulation results.
    Appears in Collections:[通訊工程研究所] 博碩士論文

    Files in This Item:

    File SizeFormat
    0KbUnknown701View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明