نتایج جستجو برای: wired network
تعداد نتایج: 675376 فیلتر نتایج به سال:
In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn’t need to consider the mobility of the node. But in wireless network it needs to keep the mobility information in the protected way. To give a privacy protection in th...
Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...
In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the use of MANET application.Therefor, the selection of efficient methodologies and techniques to protect MANET is an important aspect. Detecting malicious nodes in an open adhoc network in which participati...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and malicious traffic technologies was not ready. So Mal...
The IEEE 802.11 wireless LAN standard specifies which messages shall be exchanged between an access point and a station to support mobility. However, the implementation of mobility in the wired part of the network, i.e. the distribution system or inter-access point protocol, is not specified. This paper presents and evaluates different options for the implementation of the distribution system u...
Wireless mesh networks (WMNs) consist of static wireless routers, some of which, called gateways, are directly connected to the wired infrastructure. User stations are connected to the wired infrastructure via wireless routers. This paper presents a simple and effective management architecture for WMNs, termed configurable access network (CAN). Under this architecture, the control function is s...
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network (WSN). Security is becoming a major concern for WSN protocol designers because of the wide security-critical applicat...
In recent years WLAN is projecting itself as alternate solution to carry out enterprise’s network traffic. The basic mode of WLAN is classified as ad-hoc mode and infrastructure mode. Infrastructure mode use wired network as backbone. The enterprise WLAN network design preferred infrastructure mode which assume as extension to wired network. The wireless access point is major component of infra...
Security issues in MANET are of primary importance due to its higher vulnerability to attacks compared to wired networks. Though attack prevention mechanisms using authentication and encryption become the first line of defense, newer types of attacks cannot be detected by such systems. A second line of defense is necessary to detect and respond to intrusion. In MANETs the attack can occur withi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید