Moumita has Published 175 Answers

In MySQL, how can we convert a value from one number system to the value in another number system?

Moumita

Moumita

Updated on 03-Feb-2020 06:11:19

With the help of MySQL CONV() function, a value from one number system can be converted to the other number system.SyntaxCONV(N, from_base, to_base)Here, ‘N’ is the number which is to be converted, ‘from_base’ is the current base of that number and ‘to_base’ is the base in which that number has ... Read More

How can we use BIN() function with MySQL WHERE clause?

Moumita

Moumita

Updated on 30-Jan-2020 07:06:45

When BIN() string function is used with WHERE clause, the output returns by it will depend upon the condition given in WHERE clause. In this case, we must have to use binary value in WHERE clause. For example, suppose we have a table named ‘Student’ and we want to get ... Read More

QOS Traffic Scheduling

Moumita

Moumita

Updated on 09-Jan-2020 10:19:23

QoS traffic scheduling is a scheduling methodology of network traffic based upon QoS (Quality of Service). Here, the frames or packets are mapped to internal forwarding queues based on its QoS information, which are then services according to a queuing scheme.Typically, multiple queues are present each with different priority levels. ... Read More

Worldwide Interoperability for Microwave Access (WiMAX)

Moumita

Moumita

Updated on 09-Jan-2020 10:17:46

Worldwide Interoperability for Microwave Access (WiMAX), is a wireless microwave technology based on the IEEE 802.16 standards. It was originally published in 2001 by WiMAX forum, the version which is now called fixed WiMAX. It is similar to Wi-Fi, though it provides higher data rates up to 1 Gbps even ... Read More

Comparison of 802.16 with 802.11

Moumita

Moumita

Updated on 09-Jan-2020 10:16:11

IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access.The IEEE 802.11 standard that lays down the specifications of the wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a ... Read More

What is dynamic frequency selection (DFS)?

Moumita

Moumita

Updated on 09-Jan-2020 10:13:47

Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices.FeaturesDFS is a legal mandate for all IEEE 802.11 devices which share 5 GHz radio spectrum with ... Read More

What is wireless broadband (WiBB)?

Moumita

Moumita

Updated on 09-Jan-2020 10:10:23

Wireless broadband (WiBB) a networking technology designed to impart highspeed Internet and data service through wireless networks. Wireless broadband may be delivered through wireless local area networks (WLANs) or wide area networks (WWANs).Similar to other wireless services, wireless broadband can be either fixed or mobile.Features of WiBBWiBB is similar to ... Read More

Advanced Encryption Standard (AES)

Moumita

Moumita

Updated on 09-Jan-2020 07:53:44

The Advanced Encryption Standard, or AES, is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of USA. It is implemented worldwide both in hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless ... Read More

Wired Equivalent Privacy (WEP)

Moumita

Moumita

Updated on 09-Jan-2020 07:50:51

Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide ... Read More

WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)

Moumita

Moumita

Updated on 09-Jan-2020 07:47:58

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards to protect network stations connected to WiFi networks. They were developed by WiFi Alliance for delivering sophisticated data encryption technologies and improved user authentication than the pre-existing Wired Equivalent Privacy (WEP).WiFi Protected Access (WPA)Wi-Fi Protected Access (WPA) ... Read More

Advertisements