- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1625 Articles for Computer Network
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
1K+ Views
Anycast is a method for routing network traffic where the sender distributes packets to a destination that is adjacent to it in terms of network topology. The features of Anycasting is that the networking approach can allow for messages to be shared to a team of receivers that all have the similar destination address.The Anycast method is one address and routing methodology compared with others including unicasting. Unicast facilitates a one-to-one connection between a server and a destination address. There are different procedures like multicast and broadcast that send signals from one point to multiple points.Anycasting is ruled by the ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
829 Views
Let us begin by understanding what WEP is.WEPWEP stands for Wired Equivalent Privacy. It is the generally used Wi-Fi security protocol in the world. WEP was produced as a Wi-Fi security requirement in 1999, September.The first form of WEP was not especially strong, even for the time they were launched, because U.S. regulation on the export of several cryptographic technologies led to manufacturers confining their devices to only 64-bit encryption. When the condition was lifted, it was raised to 128-bit. In spite of the introduction of 256-bit WEP, 128-bit remains one of the most common implementations.WEP was destined to support ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
296 Views
A web page is described as a single file or a singular page of any website. Each webpage is connected to a specific URL address used to render or access that specific page. These URLs and web pages can be private or public, based on how the developers have set up them.Some web browsers can be used to operate URLs, which can also be copied and shared by users. Viewing a website does not generally require some navigation if it can have its URL address. However, some URLs are attached to a website that facilitates developers to make a suitable ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
485 Views
Let us understand what Synchronous Optical Networking (SONET) is.SONETSONET stands for Synchronous Optical Networking. It is a standardized digital communication protocol that can transmit a large volume of data over relatively long distances using a fiber optic medium. With SONET, several digital data streams are shared simultaneously over optical fiber using LEDs and laser beams.SONET provides several streams concurrently and supports efficient services in telecommunication systems. It uses standardized line rates, thus all types of organizations can be interconnected using SONET.The network architecture of a SONET depends on transmitting data even if a section of the network has declined. SONET ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
788 Views
ADSL represents Asymmetric Digital Subscriber Line. ADSL is a kind of DSL, which is a technique of sharing data over copper mobile lines. While symmetrical DSL (SDSL) transfer and downloads data at a similar speed, ADSL has several maximum data transfer rates for uploading and downloading information.For example, an ADSL connection can enable download costs of 1.5Mbps, while upload speeds can only reach 256Kbps. Because several users download much more data than they upload, this difference generally does not create a noticeable element on Internet access speeds. Still, for Web servers or other computers that send various data upstream, ADSL ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
341 Views
Let us understand what Synchronous optical networking (SONET) is.SONETSONET stands for Synchronous optical networking. It is a standardized digital connection protocol that can share a huge volume of data over relatively long distances using a fiber optic medium. In SONET, there are various digital data streams are shared simultaneously over optical fiber utilizing LEDs and laser beams.SONET provides multiple data streams at the same time. It was created to support efficient services in telecommunication systems and thus became widely adopted. SONET uses standardized costs so that all types of organizations can be interconnected.In packet-oriented networks, a single packet normally includes ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
1K+ Views
Let us begin by understanding what URL is.URLURL stands for uniform resource identifier. It can indicate the location of a web resource to access the web pages. The URL sends users to a definite resource online including video, webpage, or other resources. When you search for some query on Google, it will show the various URLs of the resource that are all associated with your search query. The URLs which are shown are the hyperlink to create the web pages.A URL is placed in the address bar or search bar at the top of the browser window. The URL is ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
537 Views
Let us begin by learning about GSM.GSMGSM is a standard set produced by European Telecommunications Standards Institute (ETSI) to represents technologies for second-generation (2G) digital mobile system. The GSM standard is more enhanced after the development of the third-generation (3G) UMTS standard created by the 3GPP.GSM phones can be recognized by the existence of a Subscriber Identity Module (SIM). This is a very small object, which is about as broad as a finger, is a removable smart card that includes a user’s subscription data, and some contact entries.This SIM card enables a user to switch from one GSM phone to ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
675 Views
Let us begin by understanding what SHA1 is.SHA1SHA-1 is one of the most broadly used and set up cryptographic hash functions frequently used by SSL certificate authorities to sign certificates. It was the earliest hash algorithm stated for use by the U.S. federal government. It was produced by NIST and the NSA.SHA-1 was written as a federal administration standard in 1995 as an upgrade to the SHA, which was written in 1993. It takes an input and makes a 160-bit (20-byte) hash value called a message digest. It is generally described by a 40-digit long hexadecimal string. The SHA-1 is ... Read More
![Ginni](https://www.tutorialspoint.com/assets/profiles/315708/profile/60_2311-1620134876.jpg)
992 Views
VPN represents the virtual private network. It is an encrypted connection over the web from a device to a network. The encrypted connection helps provide that sensitive information is safely transmitted. It avoids unauthorized persons from eavesdropping on the traffic and enables the user to manage work remotely. VPN technology is broadly used in corporate environments.A VPN protects your IP address by allowing the network to redirect it through a specially configured remote server run by a VPN host. This defines that if you surf online with a VPN, the VPN server becomes the source of your information. This defines ... Read More