Open Access   Article Go Back

Secure Data Transfer and 802.11 Channel Usage in Networking

Divya M V1 , G S Girish2

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-03 , Page no. 101-104, May-2016

Online published on Jun 07, 2016

Copyright © Divya M V , G S Girish . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Divya M V , G S Girish , “Secure Data Transfer and 802.11 Channel Usage in Networking,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.03, pp.101-104, 2016.

MLA Style Citation: Divya M V , G S Girish "Secure Data Transfer and 802.11 Channel Usage in Networking." International Journal of Computer Sciences and Engineering 04.03 (2016): 101-104.

APA Style Citation: Divya M V , G S Girish , (2016). Secure Data Transfer and 802.11 Channel Usage in Networking. International Journal of Computer Sciences and Engineering, 04(03), 101-104.

BibTex Style Citation:
@article{V_2016,
author = {Divya M V , G S Girish },
title = {Secure Data Transfer and 802.11 Channel Usage in Networking},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {04},
Issue = {03},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {101-104},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=73},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=73
TI - Secure Data Transfer and 802.11 Channel Usage in Networking
T2 - International Journal of Computer Sciences and Engineering
AU - Divya M V , G S Girish
PY - 2016
DA - 2016/06/07
PB - IJCSE, Indore, INDIA
SP - 101-104
IS - 03
VL - 04
SN - 2347-2693
ER -

           

Abstract

Data exchange rate is an estimation of the measure of information sent between two focuses on a system in a given time period. It is a profoundly critical idea in cutting edge business organizing, with high information exchange rates permitting systems to be utilized for complex undertakings, for example, internet spilling. Understanding information exchange rate could offer you some assistance with improving the execution of your business' own particular system. Today remote sensors system is broadly utilized as a part of all the association for their day-by-day correspondence. A remote sensors system is accumulation of hubs in a system. Each individual performs all their day by day exchange and correspondence with the assistance of web. In this paper we discuss mainly about Wi-Fi and its general utilization all over as it required no wire association it generally its work with the assistance of unguided media. The individual dependably imparts their data and information to the assistance of remote transmission some time they share private data, which required more security. As in the system, some unapproved individual expected to get to the individual and secret data of data.

Key-Words / Index Term

Remote Sensor, Wi-Fi, Remote Transmission.

References

[1] Cheng Chen, Rapeepat Ratasuk, Amitava Ghosh ,” -“ Downlink performance analysis of lte and WIFI coexistence in unlicensed bands with a simple listen-before-talk scheme” vehicular technology conference (vtc spring), 2015 ieee 81st,2015
[2] Attiuttama and Kanojia Sindhuben babulal, "Analyzing Superiority of Tail Drop over Random Early Discard by evaluating throughput using varying queue length in 802.11", International Journal of Computer Sciences and Engineering, Volume-03, Issue-11, Page No (23-27), Nov -2015, E-ISSN: 2347-2693
[3] Zhenxing Liu1 , Lu Liu1,2, Richard Hill1 , Yongzhao Zhan2 “-“Base62x: An Alternative Approach to Base64 for non-Alphanumeric Characters”, 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
[4] Gurpreet Singh, Supriya,-“ Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES”, 2013 Second International Conference on Advanced Computing, Networking and Security
[5] Junhua Wang, Zhuoming Xu (), Jin Zhang”-“ Implementation Strategies for CSV Fragment Retrieval over HTTP”, 2015 12th Web Information System and Application Conference