Font Size: a A A

The Design And Engineering Practice Of WLAN In A Military Subarea Organ And Teams

Posted on:2010-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:X H LiFull Text:PDF
GTID:2178360278460184Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
While WLAN has been widely used in civilian fields, It also has a wide range of applications in the military application because it's fast, flexible and easy to extend. However, the application of WLAN in the grass-roots frontier defence army is still in the exploring phase. Based on a variety of communications needs in the military subarea of the southwest border, The WLAN networking technology was researched,A safe, efficient and resistive WLAN based on IEEE802.11g was designed and constructed, It can extend frontier defence army communications, protect emergency communications and improve the capacity of border management and control. It is valuable to application as the design of WLAN in the Military subarea fully reflecting the combination of military and civilian, the combination of peacetime and wartime. It has important exemplary significance to the frontier defence army.The development of WLAN in the civil and military aspects were analyzed in this paper, The IEEE802.11 WLAN protocol series were researched, The WLAN networking technology is researched, The composition of WLAN, The network topology and the network design principles were mainly studied. The familiar software and hardware of WLAN were contrasted. The status in quo of communication network in military subarea was analyzed, the network requirement of the military subarea was sumed up and put forward, The WLAN system of the military subarea was designed. The design of network topology was elementarily simulated by OPNET. The security problem of WLAN was analyzed. The settlement scheme of the military subarea was presented in allusion to the safety of military application. The defence measure of mac layer was presented in allusion to the familiar network attacks. The technique question in the network practice process was discussed. The network overcast was effectively tested by testing software. AP overcast collectivity scheme was marked out, The optimized measure was presented.
Keywords/Search Tags:IEEE802.11, Network Needs, Network Technology, Security Policy
PDF Full Text Request
Related items