Abstract:
Examples disclose a method, executable by a processor, to assign a metric of vulnerability to a virtual machine. Based on the metric of vulnerability, the method places the virtual machine into a detection phase. Additionally, the examples disclose the method is to receive an alert corresponding to the virtual machine and based this received alert, the method implements a countermeasure.
Abstract:
A computing device can determine a radio frequency (RF) bandwidth in which one or more frames are to be transmitted by the computing device. The RF bandwidth is within the operating transmission bandwidth of the computing device. A signal interference having an interference bandwidth can interfere with the transmission of the one or more frames. In response to detecting the signal interference, one or more frames can be transmitted within the operating transmission bandwidth and not within the interference bandwidth.
Abstract:
A computing device can determine a radio frequency (RF) bandwidth in which one or more frames are to be transmitted by the computing device. The RF bandwidth is within the operating transmission bandwidth of the computing device. A signal interference having an interference bandwidth can interfere with the transmission of the one or more frames. In response to detecting the signal interference, one or more frames can be transmitted within the operating transmission bandwidth and not within the interference bandwidth.
Abstract:
A first distance between a first node and a target node is computed based on a first time-of-flight (ToF) of a communication sequence between the first node and the target node. A second distance between a second node and the target node is computed based on a second ToF of the communication sequence between the first node and the target node, as recorded by the second node. A location of the target node is determined based on the first distance and the second distance.
Abstract:
Examples disclose a method, executable by a processor, to assign a metric of vulnerability to a virtual machine. Based on the metric of vulnerability, the method places the virtual machine into a detection phase. Additionally, the examples disclose the method is to receive an alert corresponding to the virtual machine and based this received alert, the method implements a countermeasure.
Abstract:
According to an example, a distributed antenna system includes a central processing apparatus and a plurality of antenna apparatuses connected to the central processing apparatus via Ethernet cables through an Ethernet switch. The plurality of antenna apparatuses are spatially distributed with respect to each other and the central processing apparatus is to communicate Ethernet packets to the plurality of antenna apparatuses. In addition, the plurality of antenna apparatuses are to wirelessly transmit signals corresponding to data contained in the Ethernet packets in a substantially coordinated and synchronized manner with respect to each other.
Abstract:
According to an example, a receiver having a physical (PHY) layer may receive a portion of a frame from a transmitter, in which the portion of the frame comprises information available at the PHY layer. A signature of the transmitter may be determined based upon the information available at the PHY layer and a hardware component in the PHY layer may determine whether to continue to receive the frame based upon the determined signature of the transmitter.
Abstract:
A first distance between a first node and a target node is computed based on a first time-of-flight (ToF) of a communication sequence between the first node and the target node. A second distance between a second node and the target node is computed based on a second ToF of the communication sequence between the first node and the target node, as recorded by the second node. A location of the target node is determined based on the first distance and the second distance.
Abstract:
Data is transmitted over a wireless network by encoding data using a rateless code. A multi-cast signal is wirelessly transmitted to communicate the encoded data for any one or more receivers. The wireless transmission is performed in a manner that is agnostic as to a number of antennas that are utilized by each of the one or more receivers.
Abstract:
According to an example, a receiver having a physical (PHY) layer may receive a portion of a frame from a transmitter, in which the portion of the frame comprises information available at the PHY layer. A signature of the transmitter may be determined based upon the information available at the PHY layer and a hardware component in the PHY layer may determine whether to continue to receive the frame based upon the determined signature of the transmitter.