Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chi-Yu Huang is active.

Publication


Featured researches published by Chi-Yu Huang.


Archive | 2010

802.11 Wireless Networks

Alan Holt; Chi-Yu Huang

This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every component of the network, from the client supplicant and the access-points, through to the supporting servers (e.g. RADIUS). Much of the infrastructure is based upon Linux and open source software, but the book also addresses configuration of equipment from three of the largest wireless network equipment providers: Cisco, Alacatel-Lucent (Aruba) and Meru. Furthermore, the book contains coverage of more theoretical topics on performance analysis and monitoring wireless LANs, including the new 802.11n standard.


Archive | 2014

The Filesystem in Detail

Alan Holt; Chi-Yu Huang

Persistent data is stored in files. Files may contain text, database records, source code or executable instructions, but as far as the kernel is concerned, the content of a file is merely an unstructured byte stream. Files are organised in directories.


Archive | 2014

Building an Embedded System (First Pass)

Alan Holt; Chi-Yu Huang

In this chapter and the next (Chap. 6) we show how to build embedded GNU/Linux systems. This chapter is a first pass. We use various tools to generate the software components so that we can focus on the structure of the system rather than the details. In Chap. 6 (second pass), we cover the topic in greater depth and construct a system from the source code.


Archive | 2014

Building an Embedded System (Second Pass)

Alan Holt; Chi-Yu Huang

In the previous chapter we showed how to build an embedded system which ran in a virtual machine. We will refer to this system as the “deb” system to distinguish it from the embedded system described in this chapter.


Archive | 2014

Overview of GNU/Linux

Alan Holt; Chi-Yu Huang

A full GNU/Linux distribution will also include a large collection of application software (email clients, web browsers, database management systems, compilers, for example) but for the purposes of this chapter, we focus on the four components listed above.


Archive | 2010

Medium Access Control

Alan Holt; Chi-Yu Huang

The MAC layer implements a number of coordination functions, which are responsible for controlling wireless channel access. The distributed coordination function (DCF) and point coordination function (PCF) are covered. The hybrid coordination function (HCF) from the 802.11e is also discussed.


Archive | 2010

MAC Layer Performance Analysis

Alan Holt; Chi-Yu Huang

Models of the 802.11 MAC sub-layer are developed and analysed. We show the effects of the RTS/CTS mechanism and fragmentation on performance. We use Maple, a commercial computer algebra system, to analyse these models.


Archive | 2010

Configuring Wireless Networks

Alan Holt; Chi-Yu Huang

In this chapter, we show how to implement a number of wireless network solutions. We show examples using Cisco, Alcatel-Lucent and Meru equipment. We also show how to implement an open source access-point.


Archive | 2010

Robust Security Network

Alan Holt; Chi-Yu Huang

In this chapter, we give a detailed description of how to implement a wireless network with enterprise security. Enterprise security requires a RADIUS server for authentication. We show how to configure the FreeRadius for an enterprise WLAN.


Archive | 2010

Link Rate Adaptation

Alan Holt; Chi-Yu Huang

802.11 devices select modulation techniques (and consequently link speeds) according to the RF environment. In this chapter we develop a number of signal loss models and use them to analyse link rate adaptation. Maple is used extensively throughout this chapter.

Collaboration


Dive into the Chi-Yu Huang's collaboration.

Top Co-Authors

Avatar

Alan Holt

University of Waikato

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kai Cheng

Brunel University London

View shared research outputs
Researchain Logo
Decentralizing Knowledge