Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Awlp: building a custom wireless access point using open source software
Download
index.pdf
Date
2005
Author
Çakırcalı, Alptekin
Metadata
Show full item record
Item Usage Stats
177
views
56
downloads
Cite This
Almost all commercially available wireless access devices are special embedded systems with proprietary software that do not allow any modifications. Modifications to these systems are only possible by firmware upgrades released by manufacturers. However, release times of these firmware upgrades are unpredictable, and they are usually for bug-fix purposes rather than being feature and capability improvements. Thus, these devices fail to provide the needed flexibility. Ability to provide timely custom solution that is well integrated into existing network infrastructure is the key factor for a successful wireless access service implementation. In this thesis work, the open source software called AWLP is designed, coded, tested, and released to public as a viable alternative for creating custom wireless access device.
Subject Keywords
Information technology.
URI
http://etd.lib.metu.edu.tr/upload/12606541/index.pdf
https://hdl.handle.net/11511/15314
Collections
Graduate School of Informatics, Thesis
Suggestions
OpenMETU
Core
A complex event processing framework implementation using heterogeneous devices in smart environments
Kaya, Muammer Özge; Eren, Pekin Erhan; Department of Information Systems (2012)
Significant developments in microprocessor and sensor technology make wirelessly connected small computing devices widely available; hence they are being used frequently to collect data from the environment. In this study, we construct a framework in order to extract high level information in an environment containing such pervasive computing devices. In the framework, raw data originating from wireless sensors are collected using an event driven system and converted to simple events for transmission over a...
Video distribution over IP networks
Özdem, Mehmet; Erten, Y. Murat; Department of Information Systems (2007)
As applications like IPTV and VoD (Video on demand) are gaining popularity, it is becoming more important to study the behavior of video signals in the Internet access infrastructures such as ADSL and cable networks. Average delay, average jitter and packet loss in these networks affect the quality of service, hence transmission and access speeds need to be determined such that these parameters are minimized. In this study the behavior of the above mentioned IP networks under variable bit rate (VBR) video t...
Analysis of electronic signature in Turkey from the legal and economic perspectives and the awareness level in the country
İskender, Gökhan; Koçyiğit, Altan; Department of Information Systems (2006)
As in the case of other information technologies, the best way of obtaining efficient results from electronic signature application is integrating it to the legal and economic systems and increasing the awareness level of technology in the society. This thesis performs the legal and economic analyses of electronic signature in Turkey and measures the awareness level in the society. The analyses performed in the thesis show that electronic signature is not legally established in Turkey even the legal base is...
Attack tree based information technology security metric integrating enterprise objectives with vulnerabilities
Karabey, Buğra; Baykal, Nazife; Department of Information Systems (2011)
Security is one of the key concerns in the domain of Information Technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based methodology is essential in prioritizing the response strategies to these risks and also this approach is required for resource allocation schedules to mitigate such risks. In addition to t...
Estimation of time-dependent link costs using GPS track data
Ünsal, Ahmet Dündar; Usul, Nurünnisa; Department of Geodetic and Geographical Information Technologies (2006)
Intelligent Transport Systems (ITS) are becoming a part of our daily lives in various forms of application. Their success depends highly on the accuracy of the digital data they use. In networks where characteristics change by time, time-based network analysis algorithms provide results that are more accurate. However, these analyses require time-based travel speed data to provide accurate results. Conventionally, traffic data are usually obtained using the data provided from loop-detectors. These detectors...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. Çakırcalı, “Awlp: building a custom wireless access point using open source software,” M.S. - Master of Science, Middle East Technical University, 2005.