Simulation system and simulation method of wireless network security protocol
A security protocol, wireless network technology, applied in the field of wireless network protocol simulation, to achieve the effect of convenient loading, reducing program complexity and low coupling
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0085] Examples:
[0086] In order to test the effectiveness of the simulation platform, the present invention takes the test of the WEP security protocol module implemented by the user as an example to illustrate the simulation of the present invention.
[0087] 1. Simulation scenario
[0088] Figure 4 Shown is the scenario used in this test, S is the applicant, AP is the authenticator, and STA is the destination node for S to send data packets. Figure 5 Shown is the node model of applicant S who joined the WEP security protocol module, Image 6 Shown is the node model of applicant S who has not joined the WEP security protocol module.
[0089] This test uses two simulation scenarios. The parameter settings of the two simulation scenarios are the same. S starts to send data packets from the 0th second, working time is 30 seconds, non-working time is 15 seconds, and is sent to the scene every 1 second during working time. The STA sends a data packet, and the simulation run time is set
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap