×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [band channel]
3-MAC and 802.11
886 views
Many personal devices have rich set of capabilities: sensors, communication, computing power and data storage, and they are personal. Potentially they
215 views
Seminar, April 3, 2006 Security Issues in Mobile Ad hoc Networks Sudipto Das BCSE – IV, Roll – 02892 Department of Computer Science & Engineering, Jadavpur
216 views
Expanding the control over the operating system from the database
9.428 views
IDS
1.331 views
mems poster
27 views
lec04
213 views
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea 2006.11.10
215 views
5: DataLink Layer5-1 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up access m point-to-point link between
232 views
Intrusion Detection Systems and Practices Chapter 13
213 views
5: DataLink Layer5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Ethernet
243 views
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet
231 views
Next >