MCA Articles

Page 35 of 95

WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2)

Moumita
Moumita
Updated on 16-Mar-2026 683 Views

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards designed to protect network stations connected to WiFi networks. They were developed by the WiFi Alliance to deliver sophisticated data encryption technologies and improved user authentication over the pre-existing Wired Equivalent Privacy (WEP) standard. WiFi Protected Access (WPA) Wi-Fi Protected Access (WPA) was introduced in 2003 as an interim solution to address WEP's security vulnerabilities. It was designed to be backward-compatible with existing WEP hardware, enabling rapid and hassle-free adoption across wireless networks. The encryption method adopted in WPA is the Temporal Key Integrity ...

Read More

Wired Equivalent Privacy (WEP)

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide the same level of security and confidentiality in wireless networks as in wired counterparts. Features of WEP Introduction − WEP was introduced as a part of IEEE 802.11 standard in 1997 and was available for 802.11a and 802.11b devices. Encryption Method − WEP uses ...

Read More

Advanced Encryption Standard (AES)

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

The Advanced Encryption Standard (AES) is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of the USA. It is implemented worldwide in both hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless networks. Features of AES Block cipher architecture − AES is a subset of the Rijndael block cipher that operates on fixed-size data blocks. DES successor − It is stronger and faster than Data Encryption Standard (DES), providing enhanced security. Symmetric key encryption ...

Read More

What is wireless broadband (WiBB)?

Moumita
Moumita
Updated on 16-Mar-2026 10K+ Views

Wireless broadband (WiBB) is a networking technology designed to provide high-speed Internet and data services through wireless networks. Unlike traditional wired connections, wireless broadband uses radio waves to deliver connectivity, eliminating the need for physical cables to end users. Wireless broadband can be delivered through wireless local area networks (WLANs) for smaller coverage areas or wide area networks (WWANs) for broader geographical reach. Similar to other wireless services, wireless broadband can be either fixed or mobile, depending on the deployment and user requirements. Features of WiBB Last-mile wireless connectivity − WiBB connects to the Internet ...

Read More

What is dynamic frequency selection (DFS)?

Moumita
Moumita
Updated on 16-Mar-2026 835 Views

Dynamic Frequency Selection (DFS) is a technique used in IEEE 802.11 wireless networks or WiFi that permits devices to dynamically switch the operating frequency of transmission in order to avoid interference with other devices. How DFS Works DFS operates by continuously monitoring the radio spectrum for radar signals. When a wireless device detects radar activity on its current channel, it must immediately cease transmission and switch to an alternative frequency within a specified timeframe to prevent interference. DFS Frequency Switching Process WiFi AP ...

Read More

Comparison of 802.16 with 802.11

Moumita
Moumita
Updated on 16-Mar-2026 2K+ Views

IEEE 802.16 is a standard that defines Wireless Interoperability for Microwave Access (WiMAX), a wireless technology that delivers network services to the last mile of broadband access. The IEEE 802.11 standard lays down the specifications of wireless local area networks (WLAN) or Wi-Fi, that connects wireless devices within a limited area. IEEE 802.16 (WiMAX) vs IEEE 802.11 (Wi-Fi) IEEE 802.16 (WiMAX) Coverage: 7-50 km Speed: Up to 100 Mbps Frequency: 2-11 GHz Use: Outdoor, wide area ...

Read More

QOS Traffic Scheduling

Moumita
Moumita
Updated on 16-Mar-2026 4K+ Views

QoS traffic scheduling is a network management methodology that organizes and prioritizes data transmission based on Quality of Service (QoS) requirements. In this approach, frames or packets are mapped to internal forwarding queues according to their QoS information and then serviced using specific queuing schemes. Network devices typically maintain multiple queues, each with different priority levels. The scheduler determines the treatment given to traffic in each queue, mapping incoming traffic to appropriate queues based on its characteristics. For example, time-sensitive traffic like voice and video is placed in higher-priority queues than background data transfers. ...

Read More

Difference between SSH and Telnet.

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 16-Mar-2026 17K+ Views

There are various application programs that we can use to access the resources of a remote machine. Telnet and SSH are the primary client-server application programs that use remote terminal service, which allows a user at one site to interact with a remote timesharing system at another site as if the user's keyboard and display are connected directly to the remote machine. Both Telnet and SSH are Layer 7 application layer protocols and both use TCP (Transmission Control Protocol) at the transport layer. In this article, we will discuss the important differences between SSH and Telnet. But before going ...

Read More

The 802.16 MAC Sublayer Protocol

Moumita
Moumita
Updated on 16-Mar-2026 3K+ Views

The IEEE 802.16 is a set of standards defining the specifications for wireless broadband technology. It has been commercialized as Worldwide Interoperability for Microwave Access (WiMAX) that is responsible for the delivery of last-mile wireless broadband access. It lays down the standards for both physical layer as well as medium access control (MAC) layer for WiMAX. The IEEE 802.16 MAC sublayer is a part of the data link layer. The data link layer of WiMAX is divided into three sublayers as follows − Security sublayer − This is the bottommost layer and is concerned with the ...

Read More

What is Data Link Layer Switching?

Moumita
Moumita
Updated on 16-Mar-2026 18K+ Views

Data Link Layer Switching is the process of forwarding data frames between network segments using MAC addresses. This switching occurs at Layer 2 of the OSI model, where network devices called bridges and switches examine destination MAC addresses to determine the appropriate output port for frame forwarding. The data link layer receives a stream of bits from the physical layer, organizes them into frames, and uses switching to deliver these frames to their intended destinations within the same network segment or across connected segments. Data Link Layer Switching Process ...

Read More
Showing 341–350 of 941 articles
« Prev 1 33 34 35 36 37 95 Next »
Advertisements