Application on Campus Dormitory Management System Based on WiFi Technology

Article Preview

Abstract:

In recent years, with WiFi technology development, the manufacturing costs of related products continue to drop, personal computers with WiFi function and the popularization of other WiFi terminal were expanded. Especially in the higher education institutions, based on traditional cable connection network access, and because it has limited by access position and access condition, at present has been difficult to meet the teachers and students demand to high quality study, work, and the living conditions. On the contrary, the wireless network with its flexible and efficient ,free to move characteristics, favor by the of teachers and students, become the mainstream direction of the modern campus network construction, the application in campus dormitory management system on WiFi technology.It will be helpful to speed up our countrys sustained and rapid development in constructing educational informationization.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2908-2912

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] TangSiMin. WiFi technology and its application [J]. Fujian Computer,2009 (10) : 58 - 60.

Google Scholar

[2] ChenWenZhou. WiFi technology research and application [J]. Jouranl of data communication, 2010 (2) : 14-17.

Google Scholar

[3] NiuWei, GuoShiZe, WuZhiJun. Wireless local area network (LAN) [M]. Beijing: people's post and telecommunications university press, 2008: 255-259.

Google Scholar

[4] ZhangChunSheng. WiFi technology principle and future development trend [J]. Journal of digital district and intelligent household, 2011 (11) : 30-32.

Google Scholar

[5] ZhouKeQin, LiXiaoGuang. IAPP agreement on Wireless LAN [J]. Guangdong communication technology, 2011 (7) : 41 - 45.

Google Scholar

[6] Y.R. Yang, X. Li, X. Zhang, S.S. Lam. Reliable Group Rekeying: A Performance Analysis[C]. ACM SIGCOMM 2005, San Diego2009: 3023-3029.

Google Scholar

[7] C.K. Wang and S.S. Lam. Keystone: a group key management system[C]. International Conference on Telecommunications, 2010: 1577-1587.

Google Scholar

[8] F. Stajano and R. A nderson. The resurrecting duckling: Security issues for AD - hoc wireless networks[C]. The 7 th International Workshop on Security Protocols, 2009: 985-994.

DOI: 10.1007/10720107_24

Google Scholar