Bluetooth is among the standards for wireless communication. It is excepted that the volume of services provided over Bluetooth links will speedily grow over the years to come. This puts hard demands on the Bluetooth specification, to maintain the interoperability between services
Certificate management is a crucial element in PKI implementations, which includes certificate generation, distribution, storage, and revocation. Most of the existing research has been focusing on the security aspect or the functionality and the structure of certificate management systems. Very little has
Traffic recognition is a powerful tool that could provide valuable information about the network to the network operator. The association of additional information carried by control packets in the core cellular network would help identify the traffic that stem from each user
To improve the QoS ability of IP networks, Multi-Protocol Label Switching (MPLS) has been created to give QoS guaranteed services. Lately a variety of QoS routing protocols for establishing traffic engineering paths in MPLS networks (IP networks with MPLS) have been suggested
Numerous attributes of wireless networks, like mobility, frequent disconnections and varying channel conditions, have made it a tough task to develop networking protocols for wireless communications. In this report, we deal with numerous issues associated with both the routing layer and medium
With the advancement of 3G technologies like Universal Mobile Telecommunication System (UMTS), the application of TCP has become very popular for a trustworthy end-to-end (e2e) data delivery. However, TCP was basically created for wired networks and thus it is afflicted with performance
Participatory sensing is a rising and promising field, which utilizes traditional mobile wireless sensors to gather data. However, because of the randomness of its participants, it is necessary to deploy wireless sensors in the sensing area at the same time, in order
The Web is an assortment of shared resources. Online users share bandwidth and processing resources both in the network at routers and on the network’s edge at servers. Nevertheless, the Internet’s architecture doesn’t stop nodes from eating excessive resources. In reality, resource
Traditionally, firewalls and access control have been the most important components used in order to secure servers, hosts and computer networks. Today, intrusion detection systems (IDSs) are gaining attention and the usage of these systems is increasing. This thesis covers commercial IDSs and the future direction of these systems.
Cloud computing is an upcoming paradigm that offers tremendous advantages in economical aspects, such as reduced time to market, flexible computing capabilities, and limitless computing power. To use the full potential of cloud computing, data is transferred, processed and stored by external cloud providers.