Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles on Trending Technologies
Technical articles with clear explanations and examples
How to list down all the cookies by name using JavaScript?
To lists down all the cookies by name, use the cookies pairs in an array. After that, you need to get the key value pair out of this array. Example You can try to run the following code to list all the cookies click the following button and see the result:
Read MoreQOS Traffic Scheduling
QoS traffic scheduling is a scheduling methodology of network traffic based upon QoS (Quality of Service). Here, the frames or packets are mapped to internal forwarding queues based on its QoS information, which are then services according to a queuing scheme.Typically, multiple queues are present each with different priority levels. The scheduler decides the type of treatment to be given to the traffic in each queue. When traffic is available, the scheduler maps it to the appropriate queue. For example, video and voice traffic are kept is queued with higher priority than background traffic.Notable QoS Traffic Scheduling MethodsWeighted Round Robin ...
Read MoreComparison of 802.16 with 802.11
IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access.The IEEE 802.11 standard that lays down the specifications of the wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a limited area.The following chart gives a comparison between 802.16 and 802.11 −FeatureIEEE 802.16IEEE 802.11TechnologyDefines WIMAX.Defines WLANs or WiFi.Application AreaLast-mile of broadband wireless access.Limited area forming wireless LANs.Versions of the Standard802.16a, 802.16d, 802.16e, 802.16m etc.802.11a, 11b, 11g, 11n, 11ac, 11ad etc.Domain of UsageIt is used for a wide area mostly outdoors.It ...
Read MoreWhat is dynamic frequency selection (DFS)?
Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices.FeaturesDFS is a legal mandate for all IEEE 802.11 devices which share 5 GHz radio spectrum with radar.DFS was adopted in IEEE 802.11h standard for wireless transmissions. It came up in 2003, when the wireless network started using 5 GHz band that is primarily used by radar systems.The objective of DFS is to prevent co-channel interference of signals between the primary user, i.e. radar systems, and the ...
Read MoreWhat is wireless broadband (WiBB)?
Wireless broadband (WiBB) a networking technology designed to impart highspeed Internet and data service through wireless networks. Wireless broadband may be delivered through wireless local area networks (WLANs) or wide area networks (WWANs).Similar to other wireless services, wireless broadband can be either fixed or mobile.Features of WiBBWiBB is similar to wired broadband service since they connect to an internet backbone, with the difference that they use radio waves instead of cables to connect to the last mile of the network.The range of most broadband wireless access (BWA) services varies around 50 km from the transmitting tower.Download speeds provided by some ...
Read MoreHow to set src to the img tag in HTML from another domain?
To use an image on a webpage, use the tag. The tag allows you to add image source, alt, width, height, etc. The src is to add the image URL. The alt is the alternate text attribute, which is text that is visible when the image fails to load. With HTML, add the image source as another domain URL. For that, add the src attribute as a link to another domain. The following are the attributes: Sr.No. Attribute & Description 1 altThe alternate text for the image 2 heightThe height ...
Read MoreHow to set src to the img tag in html from the system drive?
To use an image on a webpage, use the tag. The tag allows you to add image source, alt, width, height, etc. The src is to add the image URL. The alt is the alternate text attribute, which is text that is visible when the image fails to load.With HTML, add the image source as the path of your system drive. For that, add the src attribute as a link to the path of system drive where the image is stored. For example, file:/D:/images/logo.pngThe following are the attributes:Sr.No.Attribute & Description1AltThe alternate text for the image2HeightThe height of the image3IsmapThe ...
Read MoreAdvanced Encryption Standard (AES)
The Advanced Encryption Standard, or AES, is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of USA. It is implemented worldwide both in hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless networks.Features of AESAES is a subset of Rijndael block cipher.It is a successor of Data Encryption Standard (DES) and is stronger and faster than DES.It is a symmetric key symmetric block cipher.It operates on 128-bit (16 bytes) data.The cipher key may be of 128, 192 or 256 bits.All computations are ...
Read MoreWired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide the same level of security and confidentiality in wireless networks as in wired counterparts.Features of WEPWEP was introduced as a part of IEEE 802.11 standard in 1997.It was available for 802.11a and 802.11b devices.WEP uses encryption of data to make it unrecognizable to eavesdroppers.It uses RC4, a stream cipher, for ...
Read MoreWiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards to protect network stations connected to WiFi networks. They were developed by WiFi Alliance for delivering sophisticated data encryption technologies and improved user authentication than the pre-existing Wired Equivalent Privacy (WEP).WiFi Protected Access (WPA)Wi-Fi Protected Access (WPA) was supported in IEEE 802.11i wireless networks and was proposed in 2004. It was backward-compatible with the existing WEP that led to its rapid, hassle-free adoption.The encryption method adopted in WPA is the Temporal Key Integrity Protocol (TKIP). TKIP includes per-packet key, integrity check, re-keying mechanism. It dynamically generates an ...
Read More