ALL-EMBRACING REVIEW OF WIRELESS NETWORK PROTOCOL,OPTIMUM NETWORK SIMULATOR
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 3
Abstract
Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and even fridges to computer networks, without physical wire connections. Wireless connectivity means that individuals can potentially entrée the Internet, CD-ROM networks and office networks from anywhere and at any time. This issue paper highlights the key elements in wireless connectivity and the looming research required in this scorching area. This paper starts with the prologue of Wireless networks, followed by the simulation modus operandi of well known newly built wireless networking software OPNET. The paper also highlights delve into reviews of various researchers in this area and finally suggests the directions of research in this field of research.
Authors and Affiliations
Sandeep Gupta , BS Dhaliwal , Rahul Malhotra
Analysis Study of Fuzzy Logic Using Blood Pressure Readings
Fuzzy logic is a form of many-valued logic or probabilistic logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (where variables may take on true or false v...
Watermarking–A Novel Approach
The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. In the recent year,...
Denoising of a Color image using fuzzy Filtering Techniques
In this paper, different types of filtering techniques are used for the removal of noise in an image. The results are obtained by three steps in the filtering process. Step by step the noise is removed in a considerable...
IP Anycast Architecture
This paper illustrates the methodology and architecture for network addressing and routing in which datagram packets routed through mathematical topological nearest node in a cluster of potential receivers that a...
Security requirements in Software Requirements Engineering
In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirement...