Campus Network Management Scheme of Wireless Network User Data Mining
نویسندگان
چکیده
منابع مشابه
Network Risk Evaluation by Data Mining
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
متن کاملInterference Management Scheme for Wireless Sensor Network
In this paper, we propose a resource allocation scheme in the frequency and time domain, to reduce interference in the Heterogeneous Network (HetNet) scenario for wireless sensor network. In the frequency domain, the macrocell allocates frequency band by using Soft Frequency Reuse (SFR), and the picocell chooses sub-bands that are not used in the macrocell sector, to avoid interference. In addi...
متن کاملA Three Criteria Data Replication Scheme using Data Mining for Wireless Cellular Network
A centralized collaborative system between nodes and Base Stations (BSs) is developed, and a new data replication scheme based on group and query prediction mobility scheme with Data Mining techniques is proposed. Utilizing the group mobility with the properties of data objects this new scheme (in various sites) minimizes the cost of remote access and improves the response time of the queries. ...
متن کاملMeasurements from a campus wireless network
|In this paper we examine a high speed wireless access network and present traÆc patterns and on-line behavior for wireless users. To date, wireless network studies have largely focused on cellular voice technologies and architectures. Here we present an analysis of data collected from an authenticated campus area access network providing both wireless 802.11b and walk-up Ethernet capabilities ...
متن کاملSecure Wireless Access to a Campus Network
This paper presents a twofold view of campus-wide wireless networks: Users and network managers. Providing an easy network experience to the user while keeping the wireless network secure and manageable is a key issue. This paper presents the description of the vendor-independent approach to a secure wireless local area network being implemented on this university campus. User configuration is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)
سال: 2016
ISSN: 2302-9293,1693-6930
DOI: 10.12928/telkomnika.v14i2a.4321