IEEE Wireless Communications 21.1 (2014): 33-41. Print. Liang, Xiaohui, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. "Efficient and Secure Protocol in Fair Document Exchange." Computer Standards & Interfaces 30.3 (2008): 167-176.
Vaidya,B., et al, Investigating Authentication Mechanisms for Wireless Mobile Network, Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science , 6159, 902-911, Springer , 2006. 11. Yang,W., Tao Zhu,W., Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation, Ubiquitous Intelligence and Computing, Lecture Notes in Computer Science, 6406,252-266 , Springer,2010. 12. Zhang,P.
It is well known that TCP is designed and tuned fo... ... middle of paper ... ...pecific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802.11, (1997), pp: I–445.  V. Paxson, M. Sargent, M. Allman, J. Chu., Computing TCP's Retransmission Timer, (2011), RFC6298.  Dalal, P., Kothari, N., and Dasgupta, K., Improving TCP Performance over Wireless Network with Frequent Disconnections, International Journal of Computer Networks and Communication, 3(6), (2011), pp.
Wireless LANs provide all the functionality of wired LANs, without the physical constraints or the wired connection itself. Wireless LAN configurations range from simple peer-to-peer topologies to complex networks offering distribution data connectivity and roaming. Besides offering end-user mobility within a networked environment, wireless LANs enable portable networks, allowing LANs to move with the knowledge workers that use them. One of the aims of the project is to illustrate suitability of a wireless LAN for the in use today. This will allow us to gain a more fundamental insight in the possibilities and restrictions of wireless LAN.
 K. Scarfone, C. Tibbs and M. Sexton, “Guide to securing WiMAX wireless communications”, National Institute of Standards and Technology Special Publication, pp. 800–127, 2010.  R. Dantu, G. Clothier and A. Atri, “EAP methods for wireless networks”, Computer Standard and Interfaces, vol. 29, pp. 289-301, 2007.
Our Project demonstration is based solely on wireless internet technology. Basically, what we set out to do was to prove that a wireless internet connection could actually be made, and that it could made to be, at least somewhat, secure. Our goals are listed below: 1.-Setup a wireless connection to the internet. 2.-Ensure that the connection can be made and that the signal will remain constant. 3-Using WEP(wired equivalent privacy), ensure that the wireless connection can be made secure.
Location-Based Service (LBS) is one of the most popular mobile services today, which offers wide range of services that are based on information about the physical location of a user or device. Typical LBS includes real-time turn-by-turn directions, find Points of Interest (POI) or social network services such as Facebook, Foursquare, Loopt, and Qype. However, user location privacy of is a major concern in today's mobile applications and there has been significant research dedicated to address this issue. Various location privacy preserving mechanisms (LPPMs) have been used to preserve the privacy of the location information of mobile users. This survey aims to present the privacy preserving mechanisms employed in the Location based services.
Hence we can see a Mobile Ad Hoc networks as an autonomous collection of all the mobile devices such as mobile phone, sensors, laptop etc. which transfer the data and communicate to each other on wireless link and they provide the required functionalities of the network when the fixed infrastructure is not available (Techtermsn.d.). This report will provide an insight view of potential of ad hoc network and the technical issues that developers and the protocol developers face with it. These issues could be such as internet connection, routing service, resource discovery etc. In this report we will have a closer view of Mobile Ad Hoc networks, what are their basic origin and their properties ... ... middle of paper ... ...le-ad-hoc-network-characteristics-and-features/ Chlamtac I, Conti M, Liu J,2003, Mobile ad hoc networking: imperatives and challenges,Accessed on May 21 2014, http://ctc.psut.edu.jo/sites/raad/wireless_notes/Mobile-ad-hoc-networking-imperatives-challenges.pdf Mueller S, Tsang T, Ghosal D, Multipath Routing in Mobile Ad Hoc Networks:Issues and Challenges,Accessed on May 21 2014, http://alumni.cs.ucr.edu/~ibasaran/research/Multipath%20Routing%20in%20Mobile%20Ad%20Hoc%20Networks%20Issues%20and%20Challenges.pdf Hoebeke J, Moerman I, Dhoedt B, Demeester P, An Overview of Mobile Ad Hoc Networks: Applications and Challenges,Accessed on May 21 2014, http://cwi.unik.no/images/Manet_Overview.pdf Ghosekar P, Katkar G, GhorpadeDr.
 Ashutosh Dutta, Sbir Das, David Famolari and Henning Schulzrinner, “Seamless Handover across Heterogeneous Networks- An IEEE 802.21 Centric Approach”, 4th Nov 2008.  Carolin Latze and Ulrich Ulte-nitsche, “Roaming, Accounting and Seamless Handover in EAP-TLS Authenticated Networks”, 25th Sep 2008.  Pyung-Soo Kim and Young Jin Kim, “Hierarchical Mobile IPv6 Based Fast Vertical Handover using IEEE 802.21 Media Independent Handover Function”, 14th jan 2008.
“It’s easier to reconfigure, move your stuff around. You can put it anywhere you want; you don't have to be concerned about the cables,” Erbschloe said. Wireless technology will also aid business clients on the road. Mobile computing will become more commonplace, when combined with voice recognition software and other technology, he said. “You can make database inquiries, voice activated, over your mobile computing device.