The Foot Step of mobile network - wireless network architecture
Journal Title: International Journal of Computer Science and Information Technologies - Year 2011, Vol 2, Issue 1
Abstract
In this paper we discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place and accepting place is very difficult. To operates this type of networks there are some software are necessary and they are very difficulty to configure because of its cost. By using this system these type of problems are solved . The architecture is tailored to productive and extensive tested networks, in which reconfiguration is even more frequent. It is provides fallback solutions for configuration errors, and kernel panics. During the life time of a WMN it is necessary that all the communication is goes frequent
Authors and Affiliations
Abdul Jabbar Khilji , Dr. Raghuraj Singh , Shruti Sandal , Shashi Shekhar Ranga
A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core bankin...
Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks
Mobile Ad Hoc Networks (MANETs) provide an attractive solution for networking in the situations where network infrastructure or service subscription is not available. Cooperative caching scheme can improve the acces...
Web Services Security Architectures using RoleBased Access Control
The Web Services Access controls are categorized according to access control granularity and have two approaches: The first approach supports a negotiation-based attribute-based access control to Web Servi...
An approach of Requirements Tracing by using a multilevel Framework
This paper presents a multilevel framework for tracing the requirements. Before presenting the framework, a review in systematic fashion was conducted and based on the results of that we tried to find out the gaps betwee...
Effect of User-Unknown Email addresses in spammers' lists
Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...