Learn More
Multi-hop wireless networks are facing some research issues regarding routing protocols and security mechanisms. Multi-hop decentralized architecture, media access delay, lower link life, and multi-layer security threats are the key challenges which need to be address. The selection of optimal path for routing and the detection of multilayer security(More)
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical(More)
Multi-channel MAC protocols have recently obtained considerable attention in wireless networking research because they promise to increase capacity of wireless networks significantly by exploiting multiple frequency bands. In this paper, we do a comparison between IEEE 802.11 and IEEE 802.15.4 and investigate the performance between both using simulations(More)
Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been proposed for ad-hoc networks, however due to the different characteristics, such intrusion detection systems cannot perform well in wireless mesh networks environment. In this paper,(More)
Two new furocarbazole alkaloids, 3-formyl-6,7-dimethoxy-furo[1,2]carbazole (1) and methyl-6,7-dimethoxy-furo[1,2]carbazole-3-carboxylate (2), along with two known carbazole alkaloids, 3-formyl-2-hydroxy-7-methoxycarbazole (3) and methyl 2,7-dimethoxycarbazole-3-carboxylate (4) were isolated from the ethyl acetate soluble fraction of Lonicera(More)
Infrastructure based IEEE 802.11 wireless mesh networks (WMNs) are new paradigm of low cost broadband technology. The large scale city-wide community-based coverage and multi-hop architecture are such characteristics which are vulnerable to network layer threats, and the adversary can exploit them for large scale degradation of the broadband services. So(More)