Font Size: a A A

Key Technologies Of WLAN Security Testing And Video Transmisson

Posted on:2013-07-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:J W ZhuFull Text:PDF
GTID:1228330434966115Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Wireless communication network has experienced a rapid growth in recent years. As the3G network becomes more and more popular, the applications of wireless networks are more widely used than ever before. It is foreseeable that some real-time wireless communication services (such as mobile video broadcasts, video conferences, online games and web TV etc.) will have broad application prospects, followed by the increasingly urgent demands on reliability, security, real-time performance and transmission rates of the users. Therefore, the research on wireless network will undoubtedly be the hot spot research issue. The user access part of3G network is consisted by the base stations (BS) and their connected users. For every BS and the online users which are under the signal range of the BS, corporately form the wireless local area network (WLAN) with the BS uses3G signal as its launch point. For WLAN, this dissertation mainly includes the following aspects:(1) Model-based wireless security protocol testing methodThis paper attempts to introduce model-based testing into security testing of protocol, then presents a protocol security testing process based on model. By analysis of802. lx protocol testing, Model-based protocol security testing method is much better in several aspects (testing process, testing accuracy and scalability) than the protocol security conformance testing method.(2) Model-based Automatic Testing(MBAT) SystemAccording to the model-based security testing process of wireless protocols, this paper develops a model-based automated testing system-MBAT system, MBAT system uses models of the IUT as the inputs, analyzes and extracts the models to generate the test sequences, finally generates the testing results throwing executing the test sequences automatically.(3) Case selection method based on relationship model and block.When the IUT version changes, this paper constitutes a relationship model with the functions of IUT and the cases for the IUT in order to make the testers focus on modified modules. Based on the relationship model, a case selection method-CSBR (Case Selection Based on Relationships) has been proposed. CSBR could solve the redundancy problem to a certain extent. Meanwhile this paper proposed an improved CSBR method-ICSBR (Improved Case Selection Based on Relationships). ICSBR divides every function of the relationship model into several code blocks to reduce the filter granularity. Simulation and experimental results show that ICSBR method can solve the redundancy problem better than CSBR method.(4) Research on WLAN reliable video multicastThis paper defines a problem which is about the situation when a BS wants to multicast video streaming to a large number of wireless users divided into several groups according to their SNR with scalable video coding (SVC), adaptive modulation and coding (AMC) and FEC&ARQ. The problem aims to determine the right resource allocation among multiple rounds. This paper proves that the problem in one or more rounds is NP-hard, and proposes an optimal algorithm. To verify the performance of the optimal algorithm, a greedy algorithm is used to compare with it.
Keywords/Search Tags:WLAN(Wireless Local Area Networks), Model-based ProtocolTesting, Case Selection, SVC(Scalable Video Coding), AMC(Adaptive Modulationand Coding), Hybrid FEC/ARQ
PDF Full Text Request
Related items