- Data Structure
- Networking
- RDBMS
- Operating System
- Java
- MS Excel
- iOS
- HTML
- CSS
- Android
- Python
- C Programming
- C++
- C#
- MongoDB
- MySQL
- Javascript
- PHP
- Physics
- Chemistry
- Biology
- Mathematics
- English
- Economics
- Psychology
- Social Studies
- Fashion Studies
- Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Moumita has Published 162 Articles
Moumita
5K+ Views
Wireless broadband (WiBB) a networking technology designed to impart highspeed Internet and data service through wireless networks. Wireless broadband may be delivered through wireless local area networks (WLANs) or wide area networks (WWANs).Similar to other wireless services, wireless broadband can be either fixed or mobile.Features of WiBBWiBB is similar to ... Read More
Moumita
1K+ Views
The Advanced Encryption Standard, or AES, is an encryption standard established in 2001 by the National Institute of Standards and Technology (NIST) of USA. It is implemented worldwide both in hardware and software to encrypt sensitive data. AES finds wide usage while transmitting data over computer networks, particularly in wireless ... Read More
Moumita
3K+ Views
Wired Equivalent Privacy (WEP) is a security standard for wireless networks or WiFi. It was a part of the original IEEE 802.11 protocol. As wireless networks transmit data over radio waves, eavesdropping on wireless data transmissions is relatively easier than in wired networks connected by cables. WEP aims to provide ... Read More
Moumita
399 Views
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) are security standards to protect network stations connected to WiFi networks. They were developed by WiFi Alliance for delivering sophisticated data encryption technologies and improved user authentication than the pre-existing Wired Equivalent Privacy (WEP).WiFi Protected Access (WPA)Wi-Fi Protected Access (WPA) ... Read More
Moumita
17K+ Views
The IEEE 802.11 standard, lays down the architecture and specifications of wireless local area networks (WLANs). WLAN or WiFi uses high frequency radio waves instead of cables for connecting the devices in LAN. Users connected by WLANs can move around within the area of network coverage.The 802.11 MAC sublayer provides ... Read More
Moumita
233 Views
First of all, the example you gave has different description for a fund. So, you should know which one to be kept. If you want to keep any description, you can use the below query using aggregation functionsSELECT X1."FundName" , min( X0."Dscription") , X0."FundId" FROM INV1 X0 ... Read More
Moumita
10K+ Views
Inter – frame SpacesInter − frame spaces (IFS) are waiting periods between transmission of frames operating in the medium access control (MAC) sublayer where carrier-sense multiple access with collision avoidance (CSMA/CA) is used. These are techniques used to prevent collisions as defined in IEEE 802.11-based WLAN standard (Wi-Fi).IFS is the ... Read More
Moumita
3K+ Views
Transmit opportunity (TXOP) is a MAC layer feature used in IEEE 802.11-based wireless local area network (WLAN). TXOP defines the time duration for which a station can send frames after it has gained contention for the transmission medium. By providing this contention-free time period, TXOP aims to increase the throughput ... Read More
Moumita
419 Views
Extended inter-frame spacing (EIFS), is a waiting period used in MAC layer of IEEE 802.11-based wireless local area network standard (WLAN standard). It is an additional waiting period used in addition to the mandatory DISF technique in case of corrupted frames.DISF (Distributed coordination function inter-frame spacing) is inserted before sending ... Read More
Moumita
273 Views
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a network protocol for carrier transmission that operates in the Medium Access Control (MAC) layer. CSMA/CA prevents collisions prior to their occurrence and is ideally used in wireless communications.Rate anomaly occurs when the performance of a high speed station is impaired ... Read More
To Continue Learning Please Login
Login with Google