Cloning refer to copying the data from one place and using it on another place. This particular work has made the task of the developers easy as it is often that the developers copy the content of one work and paste it into another but this particular procedure violets the rule of copyrights. Copying data is feasible upto one extent but copying entire data set or data or code from one place to another is a serious issue .This paper focuses on the introduction of the code cloning and data cloning and the ways to prevent the cloning.
CSMA/CA protocols rely on the random deferment of packet transmissions. Like most other protocols, CSMA/CA was designed with the assumption that the nodes would play by the rules. This is important the nodes themselves control deferment. However, with the higher programmability of the network adapters, the temptation to tamper with the software or firmware is likely to grow; in this way, a user could obtain a much larger share of the available bandwidth at the expenseof other users. This paper focuses on slotted CSMA/CA and tries to find out its limitations of the slotted CSMA/CA protocols.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.