95,446 research outputs found

    Cross-layer RaCM design for vertically integrated wireless networks

    Get PDF
    Includes bibliographical references (p. 70-74).Wireless local and metropolitan area network (WLAN/WMAN) technologies, more specifically IEEE 802.11 (or wireless fidelity, WiFi) and IEEE 802.16 (or wireless interoperability for microwave access, WiMAX), are well-suited to enterprise networking since wireless offers the advantages of rapid deployment in places that are difficult to wire. However, these networking standards are relatively young with respect to their traditional mature high-speed low-latency fixed-line networking counterparts. It is more challenging for the network provider to supply the necessary quality of service (QoS) to support the variety of existing multimedia services over wireless technology. Wireless communication is also unreliable in nature, making the provisioning of agreed QoS even more challenging. Considering the advantages and disadvantages, wireless networks prove well-suited to connecting rural areas to the Internet or as a networking solution for areas that are difficult to wire. The focus of this study specifically pertains to IEEE 802.16 and the part it plays in an IEEE vertically integrated wireless Internet (WIN): IEEE 802.16 is a wireless broadband backhaul technology, capable of connecting local area networks (LANs), wireless or fixed-line, to the Internet via a high-speed fixed-line link

    Good practice guidance for the providers of social networking and other user-interactive services

    Get PDF

    A Review on Data Storage Security in Cloud Computing Environment for Mobile devices

    Get PDF
    Cloud computing is a platform which provides different capabilities which are not just limited to storage, networking and computing capability as a service to users through Internet. Users can automatically request and release these resources on demand, by paying charges for the quantity and quality of service they use. Cloud computing for Mobile which is also referred as Mobile Cloud Computing is combination of mobile with cloud computing that provides user with unlimited access to the pool of different resources from cloud without affecting mobilization of user with his Mobile. As with its advantages it comes with the risk of data read by the cloud service provider or been grabbed by someone else using man-in-middle attack, thus affecting user privacy and integrity and losing users trust further over the service. These issues can be solved by implementing different techniques like encryption, avoiding unauthorized access to user to have access to stored data. Any algorithm or technique used for securing data should consider few important points like Mobile devices are battery powered and have less processing capability and have less storage space. In this paper we reviewed different techniques for secure storage of user’s data in the cloud, their advantages and disadvantages for mobile cloud computing environment. DOI: 10.17762/ijritcc2321-8169.150514
    • …
    corecore