What is dynamic frequency selection (DFS)?

Moumita
Updated on 09-Jan-2020 10:13:47

803 Views

Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices.FeaturesDFS is a legal mandate for all IEEE 802.11 devices which share 5 GHz radio spectrum with radar.DFS was adopted in IEEE 802.11h standard for wireless transmissions. It came up in 2003, when the wireless network started using 5 GHz band that is primarily used by radar systems.The objective of DFS is to prevent co-channel interference of signals between the primary user, i.e. radar systems, and the ... Read More

What is wireless broadband (WiBB)?

Moumita
Updated on 09-Jan-2020 10:10:23

9K+ Views

Wireless broadband (WiBB) a networking technology designed to impart highspeed Internet and data service through wireless networks. Wireless broadband may be delivered through wireless local area networks (WLANs) or wide area networks (WWANs).Similar to other wireless services, wireless broadband can be either fixed or mobile.Features of WiBBWiBB is similar to wired broadband service since they connect to an internet backbone, with the difference that they use radio waves instead of cables to connect to the last mile of the network.The range of most broadband wireless access (BWA) services varies around 50 km from the transmitting tower.Download speeds provided by some ... Read More

Text Transformation Working with CSS

AmitDiwan
Updated on 09-Jan-2020 10:00:26

194 Views

The CSS text-transform property allows us to set text capitalization for an element. It can accept the following values: capitalize, lowercase, uppercase, full-width, full-size-kana and none.SyntaxThe syntax of CSS text-transform property is as follows −Selector {    text-transform: /*value*/ }ExampleThe following examples illustrate CSS text-transform property − Live Demo h2 {    text-transform: uppercase; } .demo {    text-transform: lowercase; } q {    text-transform: capitalize;    font-style: italic; } WordPress WordPress is open source software you can use to create a beautiful website, blog, or app. 34% of the web uses WordPress, from hobby ... Read More

How to set src to the img tag in HTML from another domain?

Akshaya Akki
Updated on 09-Jan-2020 08:54:02

3K+ Views

To use an image on a webpage, use the tag. The tag allows you to add image source, alt, width, height, etc. The src is to add the image URL. The alt is the alternate text attribute, which is text that is visible when the image fails to load. With HTML, add the image source as another domain URL. For that, add the src attribute as a link to another domain.The following are the attributes:Sr.No.Attribute & Description1altThe alternate text for the image2heightThe height of the image3ismapThe image as a server-side image-map4longdescThe URL to a detailed description of an image5srcThe ... Read More

How to set src to the img tag in html from the system drive?

Manikanth Mani
Updated on 09-Jan-2020 08:42:43

19K+ Views

To use an image on a webpage, use the tag. The tag allows you to add image source, alt, width, height, etc. The src is to add the image URL. The alt is the alternate text attribute, which is text that is visible when the image fails to load.With HTML, add the image source as the path of your system drive. For that, add the src attribute as a link to the path of system drive where the image is stored. For example, file:/D:/images/logo.pngThe following are the attributes:Sr.No.Attribute & Description1AltThe alternate text for the image2HeightThe height of the image3IsmapThe ... Read More

Advanced Encryption Standard (AES)

Moumita
Updated on 09-Jan-2020 07:53:44

2K+ Views

The Advanced Encryption Standard, or AES, is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of USA. It is implemented worldwide both in hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless networks.Features of AESAES is a subset of Rijndael block cipher.It is a successor of Data Encryption Standard (DES) and is stronger and faster than DES.It is a symmetric key symmetric block cipher.It operates on 128-bit (16 bytes) data.The cipher key may be of 128, 192 or 256 bits.All computations are ... Read More

Wired Equivalent Privacy (WEP)

Moumita
Updated on 09-Jan-2020 07:50:51

4K+ Views

Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide the same level of security and confidentiality in wireless networks as in wired counterparts.Features of WEPWEP was introduced as a part of IEEE 802.11 standard in 1997.It was available for 802.11a and 802.11b devices.WEP uses encryption of data to make it unrecognizable to eavesdroppers.It uses RC4, a stream cipher, for ... Read More

WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)

Moumita
Updated on 09-Jan-2020 07:47:58

657 Views

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards to protect network stations connected to WiFi networks. They were developed by WiFi Alliance for delivering sophisticated data encryption technologies and improved user authentication than the pre-existing Wired Equivalent Privacy (WEP).WiFi Protected Access (WPA)Wi-Fi Protected Access (WPA) was supported in IEEE 802.11i wireless networks and was proposed in 2004. It was backward-compatible with the existing WEP that led to its rapid, hassle-free adoption.The encryption method adopted in WPA is the Temporal Key Integrity Protocol (TKIP). TKIP includes per-packet key, integrity check, re-keying mechanism. It dynamically generates an ... Read More

The 802.11 Frame Structure

Moumita
Updated on 09-Jan-2020 07:41:13

26K+ Views

The IEEE 802.11 standard, lays down the architecture and specifications of wireless local area networks (WLANs). WLAN or WiFi uses high frequency radio waves instead of cables for connecting the devices in LAN. Users connected by WLANs can move around within the area of network coverage.The 802.11 MAC sublayer provides an abstraction of the physical layer to the logical link control sublayer and upper layers of the OSI network. It is responsible for encapsulating frames and describing frame formats.MAC Sublayer Frame Structure of IEEE 802.11The main fields of a frame in WLANs as laid down by IEEE 802.11 are as ... Read More

Program to print Square inside a Square in C

suresh kumar
Updated on 09-Jan-2020 07:16:17

989 Views

Program DescriptionPrint Square inside a Square as shown belowAlgorithmAccept the number of rows the outer Square to be drawn Display the Outer Square with the number of rows specified by the User. Display another square inside the outer square.Example/* Program to print Square inside Square */ #include int main() {    int r, c, rows;    clrscr();    printf("Enter the Number of rows to draw Square inside a Square: ");    scanf("%d", &rows);    printf("");    for (r = 1; r

Advertisements