The relationship between VPN and Travelers.
Those who have experience in Networking Background only bid. This is a longterm project for an Education Agency. Only serious freelancers bid. You'll be given a test to check your proficiency. More details will be provided over chat.
Literature/ technical surveys... Sensor networks, IoT and Electrical Engineering. please only serious bidders. Its a good work and we dont want those who left in between. so u must have prior experience and research record
Seeking Freelancers who have worked with the such projects. The specifications are : 1) Accuracy of about 30-60 cm 2) Latency 1 seconds 3) Use of anchors or beacons to localize the receiver Please suggest if you know better solutions, I won't entertain anyone who doesn't have in depth knowledge of Embedded design principles and RF engineering experience
All the project info is attached in the PDF. Task Documentation - List of the IP addressing scheme - One or more diagrams of your (logical) network - A description of your setup / solution, how it meets the requirements and which choices you made Packet Tracer Provide a working simulation in packet-tracer of this network. We can talk price and time frame Good luck !
PCB designing and prototyping. pcb requirements : wireless connectivity using Bluetooth with mobile devices, MCU to process data received from mobile devices and according to the data vibrating the vibrating motor.
Need someone who is proficient in the following: IPv4 and IPv6 address planning Wide Area Network concepts Wide Area Network technologies Implementation and configuration of IP routing of medium complexity
- network design and architecture report for company (300 staffs) (approximately word counts 12000 - have to cover wire and wireless connection - practical testing diagrams using Cisco packet tracer - Report guide lines and project proposal would be provided
1.i want to change authentication scheme. 2.i want to add data security by embedding data in QR code along with symmetric key cryptography using AES algorithm. [login to view URL] the trust-based scheme and policy-based access control same as in the base paper, I just want to concentrate on authentication. [login to view URL] scheme proposed by the base paper is only for wireless ad-hoc networks. So I want to extend it to all wireless networks. 5. Finally, I want to simulate these things using omnet++ or NS2 or MATLAB. PFA of the base paper below. Expecting your response soon. Thank You
We design and produce unatended Photobooths, and we would like to give the users as many options to get and / or share their pictures as possible. One of these options would be to push the picture (or a link to it, if it's not possible to transmit a whole picture) via NFC or Bluetooth to the user's phone when they tap it on the designated NFC area. We would like you to write a software that controls the NFC transmitter. This software should: - Allow the NFC Transmitter to act as a reprogrammable tag for the user's to read. - Accept orders via command line: In order for it to work with the rest of the Photobooth software, so it can tell the NFC Transmitter when and what to transmit. - Be as hardware transparent as possible.
Currently my code gets can-bus data from a wireless router and sends it to my PC using UDP. The problem is that UDP is losing some of the data due to UDP's known unreliability. What I need done is to alter the code to add TCP to make sure that data is not lost.