Exploration of the Location-Identity Split
Jeffrin Rajan M1, R. Muthu Venkata Krishnan2, B.Sundarraj3, S. Sri Gowtham4

1Jeffrin Rajan M, Student,Department of CSE, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.

2R.Muthu Venkata Krishnan, , Department of CSE, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.

3B.Sundarraj Department of CSE, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.

4S. Sri Gowtham Department of CSE, Bharath Institute of Higher Education and Research, Chennai, Tamilnadu, India.

Manuscript received on 05 July 2019 | Revised Manuscript received on 18 July 2019 | Manuscript Published on 23 August 2019 | PP: 751-754 | Volume-8 Issue-9S3 August 2019 | Retrieval Number: I31550789S319/2019©BEIESP | DOI: 10.35940/ijitee.I3155.0789S319

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Superblocks must work. Given the current status of homogeneous configurations, secu-rity experts particularly desire the simulation of 802.11b. We consider how the Internet can be applied to the refinement of Scheme.

Keywords: Superblocks, Configurations, Location Identity
Scope of the Article: Addressing & Location Management