The explosive growth in the number of mobile devices such as Internet-enabled cellular phones, wireless handheld devices, wireless laptops, and tablet PCs has driven the corresponding growth in applications for mobile computing. These applications usually belong to one of two classes: collaborative applications and individual application. While collaborative applications require several mobile devices to work together and include peerto-peer computing and grid computing, individual applications are local to the mobile device and its user. In this paper, we present a framework that allows mobile devices to collaboratively work on a computationally-expensive problem.Such a problem is decomposed into smaller tasks and distributed across other mobile devices willing to share their computational power with others. This framework is based on the paradigm of grid computing applied to the domain of wireless mobile devices. This paper presents our current implementation of the framework architecture and simulation of its functionality. Also, we focus on the issues of mobility, QoS and network stability and their effect on the performance of our collaborative problem-solving framework.
This paper provides a survey of the different techniques that can be used to strengthen security in wireless local area networks (WLANs). The first generation of WLANs were deployed by small businesses and individuals at homes. The second generation of WLAN products are more secure than those of the first generation. Second generation broadband wireless networks are considered to be enterprise-level networks providing more capacity and coverage than first generation home-and small business-based WLANs. However, security remains the most critical area of concern in both first generation and second generation WLANs. In this paper, we provide a survey of second generation broadband WLANs technologies and focus on security techniques.
In this paper, we describe the development and implementation of a virtual computer lab for teaching online information assurance classes. This provides an opportunity for students to do hands-on security assignments. Different approaches to providing students with hands-on security assignments are briefly discussed and examples of several assignments are outlined.
Abstract. This paper studies the automation of fault management of wireless and mobile networks. A network management protocol similar to SNMP with an integrated architecture using mobile agents will prove effective in fault management of such networks. In view of the above, we design a wireless network management protocol to support fault management. In particular, we use mobile agents to detect, diagnose and recover from faults in wireless and mobile networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.