Found 1275 related files. Current in page 1

pengertian wireless broadband

Major Reasons One Should Opt For IP Wireless Security Camera

The PR tosses around the major reasons that will compel one to select IP wireless security camera systems.

Bell mobility careers
by LorenaBrady 0 Comments favorite 21 Viewed Download 0 Times

Cellcom website - is a licensed Bell distributor based in Montreal, Canada who specializes in the newest mobile phones, online and Telly technological innovation. The corporation began in 1985 and along both organization and customer. Making an investment in the wireless network industry has become main fascination of after its starting, and has now carried on to promote the firm to increase and expand.

State owned Telkom Indonesia to lead

JAKARTA: State-owned telecom firm PT Telekomunikasi Indonesia Tbk will take the lead in a $24 billion drive to expand Indonesia's broadband capacity over the next five years, the communication and information minister said.

Highly Improved Handoff Performance in MIMOEnabled CBTC System

Communication-Based Train Control (CBTC) system is an automated train control system to ensure the safe operation of rail vehicles using data communication. Bidirectional wireless train–ground communications is used to transfer control data between trains and wayside equipment. Wireless local area network (WLAN) based CBTC has impact on train control performance while taking handoff decisions. This may leads to communication interrupt and long latency. Inorder to minimize the handoff latency and to improve the performance, a handoff scheme in CBTC system based on WLANs with multiple-input-multiple-output is proposed.

Review on Cluster-head Election Mechanisms for  Clustering Based Routing in Mobile Ad-hoc Network

Wireless Ad hoc network is a set of wireless devices which move randomly and communicate with other node via radio signal. Ad-hoc networks may be logically represented as a set of clusters by grouping together nodes on the basis of different criteria such as 1-hop and k-hop that are in close boundary with one another. Clusters are formed by diffusing node identities along the wireless links. Different heuristics employ different policies to elect cluster heads. Several of these policies are biased in favour of some nodes. As a result, these nodes should greater responsibility and may deplete their energy faster, causing them to drop out of the network. Therefore, there is a need for load-balancing among cluster-heads to allow all nodes the opportunity to serve as a cluster-head. In this paper, different cluster head election mechanism are discussed in the one hop clustering approach.

Improving the Performance of Energy Attack Detection  in Wireless Sensor Networks by Secure forward

Wireless ad-hoc sensor networks and routing data in them is a significant research area. The objective of this paper is to examine resource depletion attacks at the routing protocol layer, which attempts to permanently disable network nodes by quickly draining their battery power. This type of attack is called as vampire attack. Vampire attacks are very difficult to detect because they attack the node only by sending protocol-compliant messages.

Performance Evaluation of Zigbee and Wimax

The world of wireless communications is quickly progressing. Technologies under research and development promise to deliver more services to more users in less time. Emerging wireless technologies: Wireless Local Area Networks (WiFi-802.11n), Wireless Personal Area Networks (ZigBee) and Wireless Metropolitan Area Networks (WiMAX).. In this paper physical layer parameters are tuned to study the characteristics of ZigBee and WiMAX technologies independently and proposes a study and comparison of two of most advancing communication technologies (Zigbee and WiMax). Both of these technologies are breakthrough in communication and both of them have their own positive and negative points. In some situations, in a near future highly advanced and area specific application of WSN will be required. We will analyze these two technologies, which would be appropriate for those applications & analyse weather, location and terrain conditions are capable for the communication

Hiding Methods for Preventing Jamming Attacks on  Wireless Networks

Wireless mediums open nature are capable for intentional interference attacks referred as jamming. This attacks paved a way for denial-of-service attacks on wireless networks. The intruder with immense knowledge of protocol specifications and network secrets can create low-effort jamming attacks that are difficult to detect and counter. In these attacks, the intruder is active only for a short period of time, selectively targeting messages of high importance.

A Miniaturized Ultra Wideband (UWB) Antenna Design  for Wireless Communications

This paper presents a miniaturized planar circular disc UWB antenna design for wireless communications. Printed on a dielectric substrate and fed by 50Ω microstrip line with truncated ground plane, the proposed antenna has been demonstrated to provide an ultra wide 10dB return loss bandwidth with satisfactory radiation properties. The special structure reduces the spatial volume and it is used to realize the miniaturization of the antenna. Ansoft High Frequency structure Simulator (HFSS) software tool has been employed for obtaining the simulation results. The return loss, voltage standing wave ratio (VSWR), radiation patterns and current distributions of the antenna are discussed.

Furnished Rental Apartments Downtown Toronto

All of our Furnished Rental Apartments Downtown and Furnished Short Rentals Toronto include high speed Wireless Internet, Cable TV, fully equipped kitchens and all luxury alternatives.

« previous  123456789