نتایج جستجو برای: wireless lan
تعداد نتایج: 113750 فیلتر نتایج به سال:
TCP is currently the dominant protocol for the Internet having originally been designed to perform congestion control and flow control in wired networks. Recently, wireless LAN has been very successful in extending the connectivity of the Internet. However, the performance of TCP in the wireless environment is worse than that in the wired one. Furthermore, the error rate changes with the time i...
The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion de...
Providing service differentiation in wireless networks has attracted much attention in recent research. Existing studies so far have focused on the design of MAC layer protocols to achieve distributed priority scheduling. While these works have been shown to achieve certain differentiation (higher throughput or lower delay for higher priority packets) at MAC layer, they did not consider the pro...
چکیده ندارد.
.Abrrrurr-Future mobile devices will increasingly have multi,ple sources of location information associated with them, such as GPS. cellular ~ell-s~ctor ID. Bluetooth or 802.11 wireless LAN. I n fdct. cellular phones with GPS receivers and 802.11 wireless LAN are already becoming available. However, not all location technologies will operate e\,erywhere (e.g. GPS typically will not \wrk indoors...
The security of wireless LANs has been a source of concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase in the use of wireless LANs for enterprises and homes, where information assets are shared continually, security is of the essence. With the increase in ecommerce and eservices, there is the risk of identity and credit card theft. Th...
............................................................................................................................ ii Acknowledgments......................................................................................................... iii Table of
..........................................................................................................................5
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید