Learn More
This paper, relates to computing practice where the inadequate deployment and configuration of Wireless Local Area Networks (WLANs) is considered. This inadequacy in deployment or configuration or both is open to attack by hackers and crackers. WarDriving is a term used for activities related to identifying and mapping of wireless access points/ router(More)
This paper relates to establishing and analysing the need for home area network (HAN) security. There always exists the need to balance the security set up against the risk being mitigated. Many of the non-computing savvy households pay very little attention to home network security. Previously, viruses and other malicious programs were the only threats(More)
Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and(More)
In this paper, the performance of Video Protocols was tested on three well known IP transition mechanisms such as IPv6to4, IPv6in4 and Dual-Stack. The protocols involved in this experiment were MPEG-1, MPEG-2, and MP-4 protocol. In this experiment two tunnelling and a Dual-Stack mechanisms were configured and impact of these mechanisms on Video packets was(More)
This paper investigates the performance of Video Protocols over IPv6 and IP transition mechanisms. It mainly focuses on the impact caused by IP transition mechanisms on video packets and compares this with pure IPv6 based networks. The video protocols selected in this experiment were MPEG-1, MPEG-2, MPEGP-4, MKV and FLV. In this experiment a Dual-Stack and(More)
  • 1