Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
In recent years mobile ad-hoc networks (MANET) become very popular and useful for communication. MANET is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. This network has the advantage of being able to be setup and deployed anywhere and anytime because of it's simple infrastructure setup. This book, review the MANET and recent routing protocols for efficient communication. Then it investigates the current and existing security issues associated with the ad-hoc wireless routing protocols and exposes any slack amongst them in order to lighten possible problem domains in this field of wireless mobile networks.
Mobile ad-hoc network (MANET) is a dynamic, self-organizing and self-configuring distributed wireless network that comprises of a collection of wireless mobile nodes communicating directly with each other without any fixed communication infrastructure or centralized administration. In MANET the topology keeps changing rapidly and unpredictably which makes routing in such a network a challenging task. Numerous routing protocols have been proposed for MANET. Those routing protocols are designed to adaptively accommodate for dynamic unpredictable changes in network's topology. This Book provides state-of-the-art review on the existing routing protocols for MANET and a classification of these protocols according to the routing strategy (Proactive, Reactive and Hybrid). A discussion and comparison highlighting their particular merits and drawbacks are also presented.
Network security techniques are becoming important as society is moving to digital information age. As more and more users connect to the internet the online security becomes a vital issue. The task of network security not only requires ensuring the security of end systems but of the entire network. In this book the authors explain the fundamentals of confidentiality, authenticating, and the main techniques in modern cryptography. This is a suitable textbook for graduate and self-study engineers.
Network security techniques are becoming important as society is moving to digital information age. As more and more users connect to the internet the online security becomes a vital issue. The task of network security not only requires ensuring the security of end systems but of the entire network. In this book the authors explain the fundamentals of confidentiality, authenticating, and the main techniques in modern cryptography. This is a suitable textbook for graduate and self-study engineers.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.