Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Network Articles
Page 59 of 122
What is Lifi?
Li-Fi represents light-fidelity. It is a networking technology that uses a clear spectrum instead of radio waves. The technology uses a standard LED light bulb to share information. The LED bulbs are appropriated with a chip that inflicts the light for optical data transmission which is accepted by photoreceptors.A LiFi network uses the light from LED lamps to send information to a device, including a computer or tablet. The device has a receiver to select light signals and an address to send light signals back to the lamp using infrared light.The light from the LED lamps transforms intensity lots of ...
Read MoreWhat is Private Branch Exchange (PBX)?
PBX represents private branch exchange. It is a private mobile network used within an enterprise. It is a business-oriented phone system created to supply effective voice communications among the users of an organization.It is performing as the phone company’s central office within an organization, a PBX facilitates as the exchange point and point for routing calls.PBX enables users to generate their own telephone network inside a company or organisation. With this system, employees can connect internally for collaboration objectives and externally, with users, shareholders, and several contacts using channels such as VoIP or ISDN.Every device linked to the PBX, from ...
Read MoreWhat is the difference between IGRP and BGP?
Let us understand what the Interior Gateway Routing Protocol (IGRP) is.IGRPIGRP represents the Interior Gateway Routing Protocol. It is a protocol that was generally developed for routing by Cisco Systems in the 1980s. The objective of IGRP is to develop IGRP to support a routing protocol to be used with the autonomous system architectures.IGRP uses a sequence (vector) of metrics. Internetwork delay, bandwidth, dependability, and load are all part of the routing decision. The network controller can set the weighting element for each of these metrics. IGRP uses the authority-set or the default weightings to necessarily calculate optimal routes.IGRP supports ...
Read MoreWhat is the MITM (Man in The Middle) Attack using ARP Poisoning?
MITM stands for a man-in-the-middle attack. It is a cyber-attack where an attacker transmits and probably alters the connection between two parties who consider they are communicating precisely. This enables the attacker to transmit communication, investigate, and even change what each party is saying.In MITM, it can define a type of cyberattack where an intruder covertly taps transmissions connecting two entities to check or develop traffic therebetween. Malicious ones can use MitM attacks to seize passwords or multiple sensitive data, snoop on the prey, disrupt links, or distort content.Types of MITMThe types of MITM are as follows −Rogue Access PointDevices ...
Read MoreHow does the MANETS AODV Reactive Routing Protocol work?
MANET stands for Mobile Ad-Hoc Network. It is an infrastructure-less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies which are composed of bandwidth-constrained wireless links.MANET nodes are supplied with wireless transmitters and receivers. At a given time based on the nodes positions and their transmitter and receiver coverage designs and transmission power levels, wireless connectivity in the structure of a random, multi-hop graph or ad-hoc web exists between the nodes. The current applications of MANETs are in defense services, emergency search, and rescue services, meetings, and conventions, and other scenarios ...
Read MoreWhat is an Application Delivery Controller?
ADC represents the Application delivery controller. It handles and directs the data flow among client connections and Web or enterprise software and can be used in the design of hardware devices or application programs.ADCs are generally related to application delivery networks (AND) where their goal is to implement simple tasks like what Web sites generally do to lessen the load from the Web servers.ADCs can also be discovered between a firewall and various software servers in a Web farm within a demilitarized zone (DMZ).The application delivery controller finds the crucial position of the cloud computing network. In addition to the ...
Read MoreWhat are the physical components of a Computer Network?
There are various physical components of a computer network which are as follows −NICNIC represents Network Interface Cards. A personal computer development board linked to a PC or server and works with the network control structure to force the network’s data stream. There are many network documentations that call NIC a network board. In this manner, all NICs are connected to a network.HubA hub is a standard network point, also referred to as a network hub, to connect devices in a network. The hub has numerous ports. If a packet develops one port, it can be considered by all the ...
Read MoreWhat is the difference between SNMP and Syslog?
Let us begin with the concept of Simple Network Management Protocol (SNMP).SNMPSNMP represents Simple Network Management Protocol. It is an Internet-standard protocol for handling machines on IP networks. The devices that generally support SNMP contain routers, switches, servers, workstations, printers, modem racks, etc.It is generally used in the network management structure to monitor network-connected computers for conditions needing regulatory attention. It is a framework for handling devices on the web using the TCP-IP protocol suite. It provides a collection of basic operations for monitoring and supporting the Internet.SNMP supports the concept of manager and agent. A manager is frequently a ...
Read MoreWhat are the types of HDLC Frames?
HDLC is a bit-oriented synchronous data link layer protocol that can provide the error-free transmission of data to specific destinations and control the speed at which information is sent. It supports both connection-oriented and connectionless services. It is a set of protocols that represents rules for sending data between network points. Data in HDLC is arranged into units known as frames and is transmitted across networks to specified destinations.HDLC frames are sent over synchronous links or asynchronous links, which do not indicate the beginning and end of frames. This is completed using a frame delimiter or flag, which includes a ...
Read MoreWhat is the difference between TDMA and CDMA?
Let us understand what Time Division Multiple Access (TDMA) is.TDMATDMA represents Time Division Multiple Access. It is a cellular mobile technology that depends on time-division multiplexing (TDM) techniques. In TDM, each sender is provided the whole possession of the whole bandwidth of the medium for a constant duration of time. After this, the control is transferred to the next sender, and the process carries on a round-robin basis.An example of TDM is the television broadcast. In a television serial, generally, a 10 minutes serial is followed by a 5 minutes advertisement. The time in which the serial is being broadcasted; ...
Read More