The New Balancing Act

Kuhl, Craig
February 2008
Wireless Week;2/1/2008, Vol. 14 Issue 3, p10
Trade Publication
The article discusses the search of wireless carriers for a 24/7 reliable wireless network. As technology advances, data traffic increases and customers are more reliant on higher levels of network reliability. In response to this situation, network operators are looking for ways to improve network reliability and to keep data more secure.


Related Articles

  • RELIABILITY AND INFORMATION SHARING SECURE TRACE-OUT PROTOCOL IN ROUTER BASED NETWORKS. LATHA, M. HEMA; PADMANABHAM, P.; GOVARDHAN, A. // Journal of Theoretical & Applied Information Technology;12/31/2013, Vol. 58 Issue 3, p678 

    Dependency upon Communication adaptability to a wide range and digitalization of network adds a number of devices in the network. These devices operate throughout every corner of the world as well as different purposes. Huge data transmission, easy to access and time saving are the applications...

  • Analysis of Virus Algorithms. Kalyani, Jyoti; Kahlon, Karanjit Singh; Singh, Harpal; Kalyani, Anu // Journal of Computer Science;2006, Vol. 2 Issue 10, p785 

    Security of wired and wireless networks is the most challengeable in today's computer world. The aim of this study was to give brief introduction about viruses and worms, their creators and characteristics of algorithms used by viruses. Here wired and wireless network viruses are elaborated....

  • EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks. Jose, Joyce; Princy, M.; Jose, Josna // International Journal of Security & Its Applications;Jul2013, Vol. 7 Issue 4, p299 

    The privacy preserving data aggregation protocols in wireless sensor networks have many applications in security critical areas, since it hides individual nodes' data from adversaries. The existing hop by hop and shuffling based privacy preserving protocols does not provide an energy efficient,...

  • Security Aspects and Challenges in Mobile Adhoc Networks. Moses, G. Jose; Varma, P. Suresh; Supriya, N.; NagaSatish, G. // International Journal of Computer Network & Information Security;Jun2012, Vol. 4 Issue 6, p26 

    The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The Adhoc...

  • An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks. Yang Yang; Yupu Hu; Chunhui Sun; Chao Lv; Leyou Zhang // International Arab Journal of Information Technology (IAJIT);Jan2013, Vol. 10 Issue 1, p10 

    Mobile Ad-hoc Networks (MANETs) are considered as the most promising terminal networks in future wireless communications and characterized by flexibility, fast and easy deployment, which make them an interesting technology for various applications. Group communication is one of the main concerns...

  • Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks. Sánchez, Luis; Lanza, Jorge; Muñoz, Luis; Ahola, Kimmo; Alutoin, Mikko // Wireless Personal Communications;Jan2010, Vol. 52 Issue 2, p393 

    Mobile ad hoc networking has been a hot research topic for a decade or so, and many paradigms have been making use of it. One of these paradigms is the Personal Networks (PN). It is an emerging concept where the user’s personal devices form a virtual network which is secure and private,...

  • THE EVOLUTION OF IDS SOLUTIONS IN WIRELESS AD-HOC NETWORKS TO WIRELESS MESH NETWORKS. Deb, Novarun; Chakraborty, Manali; Chaki, Nabendu // International Journal of Network Security & Its Applications;Nov2011, Vol. 3 Issue 6, p39 

    The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As...

  • An analysis of Security Attacks found in Mobile Ad-hoc Network. Kumar Singh, Umesh; Phuleria, Kailash; Sharma, Shailja; Goswami, D. N. // International Journal of Advanced Research in Computer Science;May/Jun2014, Vol. 5 Issue 5, p34 

    MANETs has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open access medium, dynamically changing network topology and lack of centralized monitoring point. The various attacks against...

  • A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET. Arunkumar, R.; Annalakshmi, A. // International Journal of Computer Applications;Jan2014, Vol. 85, p8 

    A Mobile Ad-hoc Network (MANET) is a mobile and multi-hop autonomous operation of wireless network. Collection of wireless mobile nodes way of forms a temporary network without using any pre-existing infrastructures. Intrusion Detection & Prevention System (IDPS) is one of the defence mechanisms...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics