Searched for: "protocol and network design for manageability"
- Networking (145)
- Mobility (123)
- Security (47)
- Microsoft (36)
- Enterprise Software (33)
- Data Centers (16)
- Software (16)
- Hardware (14)
- Open Source (12)
- Cxo (10)
- Collaboration (8)
- Data Management (7)
- Apple (6)
- Developer (6)
- Storage (6)
- Big Data (5)
- Cloud (5)
- Project Management (4)
- Tech & Work (3)
- Banking (2)
- Virtualization (2)
- After Hours (1)
- Consumerization (1)
- E-Commerce (1)
About 510 results for "protocol and network design for manageability"
When you need to determine what devices are connected to your network, you can turn to one of these handy utilities.
Given the sensitivity of the potential applications of wireless sensor networks, security emerges as a challenging issue in these networks. Because of the resource limitations, sym...
Now-a-days, due to advancement in wireless communication it has enabled the design and development of wireless sensor networks with less cost, less energy consumption and high util...
D2D communication motor-assisted by a cellular network brings the advantage of the proximity of wireless devices to boost reusing resources between D2D and cellular UEs, and impart...
In MANET, security is the toughest and very challenging area, because nodes are without any predefined framework. This is due to the high mobility of outstanding vulnerabilities an...
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination p...
The right storage solution is critical for business, but the price tag can put many options out of reach. Luckily, there's a host of powerful, scalable open source candidates to choose from.
As Wireless Sensor Networks (WSNs) are usually deployed in remote or even hostile environment, the adoption of security mechanism is fundamental. To achieve secure communication be...
The adoption of voice over wireless local area network is on tremendous increase due its ease, non-intrusive, inexpensive deployment, low maintenance cost, universal coverage and b...
In this paper, communication between client and application provider should be authentic; so two protocols are used for authentication which is trivial and coherent performed throu...